A Computational Review of Identity-based Signcryption Schemes

نویسندگان

  • Murari Mandal
  • Gaurav Sharma
  • Anil K. Verma
چکیده

Since 2002, several identity based signcryption schemes have been proposed. The purpose of designing a signcryption scheme is to perform signature and encryption both in one step but at lesser cost than performing signature and then encryption separately. In this paper, we present a literature survey on signcryption schemes for identity based setup. Our primary focus is on the schemes recently developed in standard model as the schemes in random oracle model are not actually practical. We present detailed comparison among the schemes based on computation cost, security features and suggest some final recommendation based on some future perspectives.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review of Elliptic Curve based Signcryption Schemes

Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of...

متن کامل

On the Security of ID Based Signcryption Schemes

A signcryption scheme is secure only if it satisfies both the confidentiality and the unforgeability properties. All the ID based signcryption schemes presented in the standard model till now do not have either the confidentiality or the unforgeability or both of these properties. Cryptanalysis of some of the schemes have been proposed already. In this work, we present the security attack on ‘S...

متن کامل

Identity Based Public Verifiable Signcryption Scheme

Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after unsigncrypting the ciphertext. Thus, a third party will not be able to verify whether the ciphertext is valid or not. Signcryption schemes that allow any user to...

متن کامل

E cient Identity-based Signcryption without Random Oracles

In this paper, we propose a new Identity-based signcryption (IBSC) scheme in the standard model. Our scheme shows an improvement of approximately 40% reduction in the ciphertext size when compared to the previously proposed IBSC schemes in the standard model. Further, we argue that the previous IBSC schemes do not provide su cient simulation ability in the security game. We show that with some ...

متن کامل

Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model

Certificateless cryptography; Aggregate signcryption; Random oracle model; Bilinear pairing Abstract The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397]. The aggregation process of these schemes reduces the amount of exchanged information and is particul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016