Ji Hui-Fang, Han Wen-Bao, Liu Lian-Dong. Identity Based Generalized Signcryption Scheme for Multiple PKGs in Standard Model[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1204-1210. doi: 10.3724/SP.J.1146.2010.01031
Citation:
Ji Hui-Fang, Han Wen-Bao, Liu Lian-Dong. Identity Based Generalized Signcryption Scheme for Multiple PKGs in Standard Model[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1204-1210. doi: 10.3724/SP.J.1146.2010.01031
Ji Hui-Fang, Han Wen-Bao, Liu Lian-Dong. Identity Based Generalized Signcryption Scheme for Multiple PKGs in Standard Model[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1204-1210. doi: 10.3724/SP.J.1146.2010.01031
Citation:
Ji Hui-Fang, Han Wen-Bao, Liu Lian-Dong. Identity Based Generalized Signcryption Scheme for Multiple PKGs in Standard Model[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1204-1210. doi: 10.3724/SP.J.1146.2010.01031
Generalized signcryption is a cryptographic primitive which could not only realize signcryption but also provide encryption and authentication alone. In this paper, the formal definition and a complete security notion of identity based generalized signcryption for multiple PKGs is defined. A concrete scheme is also proposed with security proof in standard model. Compared with several existing identity based signcryption schemes for multiple PKGs, the new scheme is more efficient and flexible.
Shamir A. Identity-based cryptosystems and signature schemes [C][J].Advances in Cryptology-Crypto8.1984, LNCS 196:47-53[3]Zheng Y L. Digital signcryption or how to achieve cost (signatureencryption) cost (signature)+cost(encryption) [C][J].Advances in Cryptology-CRYPTO9.1997, LNCS 1294:165-179[9]Yu G, Ma X X, Shen Y, and Han W B. Provable secure identity based generalized signcryption scheme [J].Theoretical Compute Science.2010, 411(40-42):3614-3624[16]Zhang Bo and Xu Qiu-liang. Identity-based multi-signcryption scheme without random oracles [J].Chinese Journal of Computer.2010, 33(1):103-109[17]Yu Y, Yang B, Sun Y, and Zhu S L. Identity based signcryption scheme without random oracles [J].Computer Standards Interfaces.2009, 31(1):56-62[18]Jin Z P, Wen Q Y, and Du H Z. An improved semantically-secure identity-based signcryption scheme in the standard model [J].Computers and Electrical Engineering.2010, 36(3):545-552