1. School of Mathematics and Finance, Chuzhou University, Chuzhou Anhui 239000, China;
2. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100190, China
In order to more effectively protect the security of network information, confidentiality and authentication of message need to be realized at the same time. Signcryption performs signature and encryption simultaneously in one logical step. In order to improve safety and efficiency of existing signcryption, an identity-based aggregate signcryption scheme was proposed by combining the ideas of aggregate signature. Under the random oracle model, the scheme was proved to be indistinguishable against adaptive chosen ciphertext attacks, and existentially unforgeable against adaptive chosen messages attacks. The security could be reduced to the elliptic curve discrete logarithm problem and computational bilinear paring Diffe-Hellman problem. Compared with serveral schemes with high efficiency and short key length, the analysis of results shows that the new scheme's signcryption and unsigncryption has only one pairing operation, thus has the excellent features with low computational cost and short length of ciphertext.
[1] ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption)≤ cost (signature) + cost (encryption) [C] //CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference, LNCS 1294. Berlin: Springer-Verlag, 1997: 165-179. [2] AN J H, DODIS Y, RABIN T. On the security of joint signature and encryption [C]//EUROCRYPT 2002: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2332. Berlin: Springer-Verlag, 2002: 83-107. [3] BAEK J, STEINFELD R, ZHENG Y. Formal proofs for the security of signcryption [C]//PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, LNCS 2274. Berlin: Springer-Verlag, 2002: 80-98. [4] MALONE-LEE J, MAO W. Two birds one stone: signcryption using RSA [C]//CT-RSA 2003: Proceedings of the 2003 Cryptographers' Track at the RSA Conference, LNCS 2612. Berlin: Springer-Verlag, 2003: 211-226. [5] MALONE-LEE J. Identity-based signcryption, Report 2002/098 [R/OL]. (2002-07-19) [2014-06-02]. http://eprint.iacr.org/2002/098. [6] LIBERT B, QUISQUATER J-J. A new identity based signcryption schemes from pairings [C]//ITW'2003: Proceedings of the 2003 IEEE Information Theory Workshop. Piscataway: IEEE, 2003: 155-158. [7] CHOW S S M, YIU S M, HUI L C K, et al. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [M]//ICISC 2003: Proceedings of the 6th International Conference on Information Security and Cryptology, LNCS 2971. Berlin: Springer-Verlag, 2004: 352-369. [8] BOYEN X. Multipurpose identity-based signcryption [C]//CRYPTO 2003: Proceedings of the 23rd Annual International Cryptology Conference, LNCS 2729. Berlin: Springer-Verlag, 2003: 383-399. [9] CHEN L, MALONE-LEE J. Improved identity-based signcryption [C]//PKC 2005: Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 3386. Berlin: Springer-Verlag, 2005: 362-379. [10] BARRETO P, LIBERT B, MCCULLAGH N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps [C]//ASIACRYPT 2005: Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 3788. Berlin: Springer-Verlag, 2005: 515-532. [11] YU Y, YANG B, SUN Y, et al. Identity based signcryption scheme without random oracles [J]. Computer Standards & Interfaces, 2009, 31(1): 56-62. [12] WANG X, QIAN H. Attacks against two identity-based signcryption schemes [C]//Proceedings of the Second International Conference on Networks Security Wireless Communications and Trusted Computing. Piscataway: IEEE, 2010, 1: 24-27. [13] BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [C]//EUROCRPYT 2003: Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin: Springer-Verlag, 2003:416-432. [14] REN X, QI Z, GENG Y. Provably secure aggregate signcryption scheme [J]. ETRI Journal, 2012, 34(3): 421-428. [15] SELVI S S D, VIVEK S S, SHRIRAM J, et al. Security analysis of aggregate signature and batch verification signature schemes, Report 2009/290 [R/OL]. [2014-06-24]. http://eprint.iacr.org/2009/290.