Efficient identity-based signcryption in the standard model

Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)


Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then- encryption approach. Signcryption has been shown to be useful in many applications, such as electronic commerce, mobile communications and smart cards. Recently, three identity-based signcryption schemes in the standard model were proposed. However, the three schemes are broken soon. How to construct a secure identity-based signcryption scheme in the standard model is still an open problem. In this paper, we solve this problem and propose an efficient identity-based signcryption scheme in the standard model. We prove that our scheme has the indistinguishability against adaptive chosen ciphertext attacks under the modified decisional bilinear Diffie-Hellman assumption and the existential unforgeability against adaptive chosen messages attacks under the computational Diffie-Hellman assumption.

Original languageEnglish
Title of host publicationProvable Security - 5th International Conference, ProvSec 2011, Proceedings
Number of pages18
Publication statusPublished - 2011
Event5th International Conference on Provable Security, ProvSec 2011 - Xi'an, China
Duration: Oct 16 2011Oct 18 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6980 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other5th International Conference on Provable Security, ProvSec 2011

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Efficient identity-based signcryption in the standard model'. Together they form a unique fingerprint.

Cite this