Abstract
In many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to “sign-then-encrypt” the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in [16]. The first one is to devise an efficient forward-secure signcryption scheme with public verifiability and public ciphertext authenticity, which is promptly closed by [10]. Another one which still remains open is to devise a hierarchical ID-based signcryption scheme that allows the user to receive signcrypted messages from sender who is under another sub-tree of the hierarchy. This paper aims at solving this problem by proposing two concrete constructions of hierarchical ID-based signcryption.
Chapter PDF
Similar content being viewed by others
References
Jee Hea An, Yevgeniy Dodis, and Tal Rabin. On the Security of Joint Signature and Encryption. In Lars R. Knudsen, editor, Advances in Cryptology-EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28–May 2, 2002, Proceedings, volume 2332 of Lecture Notes in Computer Science, pages 83–107. Springer-Verlag Heidelberg, 2002.
Mihir Bellare and Phillip Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 62–73, 1993.
Dan Boneh and Xavier Boyen. Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2–6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 223–238. Springer, 2004.
Dan Boneh and Matt Franklin. Identity-Based Encryption from the Weil Pairing. In Joe Kilian, editor, Advances in Cryptology-CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science, pages 213–229. Springer-Verlag Heidelberg, 2001.
Xavier Boyen. Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography. In Dan Boneh, editor, Advances in Cryptology-CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 2003, Proceedings, volume 2729 of Lecture Notes in Computer Science, pages 382–398. Springer, 2003.
Ran Canetti, Shai Halevi, and Jonathan Katz. Chosen-Ciphertext Security from Identity-Based Encryption. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2–6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 207–222. Springer, 2004.
Liqun Chen and John Malone-Lee. Improved Identity-Based Signcryption. In Serge Vaudenay, editor, Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings, volume 3386 of Lecture Notes in Computer Science, pages 362–379. Springer, 2005. Also available at Cryptology ePrint Archive, Report 2004/114.
Sherman S.M. Chow. Verifiable Pairing and Its Applications. In Chae Hoon Lim and Moti Yung, editors, Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23–25, Revised Selected Papers, volume 3325 of Lecture Notes in Computer Science, pages 170–187. Springer-Verlag, 2004.
Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow. Secure Hierarchical Identity Based Signature and its Application. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27–29, 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 480–494. Springer-Verlag, 2004.
Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, and K.P. Chow. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology-ICISC 2003, 6th International Conference Seoul, Korea, November 27–28, 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 352–369. Springer, 2003.
Sherman S.M. Chow, Tsz Hon Yuen, Lucas C.K. Hui, and S.M. Yiu. Signcryption in Hierarchical Identity Based Cryptosystem, 2004. Extended abstract appeared in Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30–June 1, 2005, Chiba, Japan. Full version available at Cryptology ePrint Archive, Report 2004/244.
Jean-Sébastien Coron. On the Exact Security of Full Domain Hash. In Mihir Bellare, editor, Advances in Cryptology-CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20–24, 2000, Proceedings, volume 1880 of Lecture Notes in Computer Science, pages 229–235. Springer, 2000.
Craig Gentry and Alice Silverberg. Hierarchical ID-Based Cryptography. In Yuliang Zheng, editor, Advances in Cryptology-ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1–5, 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 548–566. Springer, 2002. Available at http://eprint.iacr.org.
Florian Hess. Efficient Identity Based Signature Schemes based on Pairings. In Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15–16, 2002. Revised Papers, volume 2595 of Lecture Notes in Computer Science, pages 310–324. Springer, 2003.
Berkeley. Intel Research. Identity Based Cryptosystem for Secure Delay Tolerant Networking.
Benoît Libert and Jean-Jacques Quisquater. New Identity Based Signcryption Schemes from Pairings. In IEEE Information Theory Workshop, pages 155–158, 2003. Full Version Available at http://eprint.iacr.org.
Benoît Libert and Jean-Jacques Quisquater. The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004/102, 2004. Available at http://eprint.iacr.org.
John Malone-Lee. Identity Based Signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. Available at http://eprint.iacr.org.
Noel McCullagh and Paulo S. L. M. Barreto. Efficient and Forward-Secure Identity-Based Signcryption. Cryptology ePrint Archive, Report 2004/117, 2004. Available at http://eprint.iacr.org.
Divya Nalla and K.C. Reddy. Signcryption Scheme for Identity-Based Cryptosystems. Cryptology ePrint Archive, Report 2003/066, 2003. Available at http://eprint.iacr.org.
Dong Jin Park, Kihyun Kim, and Pil Joong Lee. Public Key Encryption with Conjunctive Field Keyword Search. In Chae Hoon Lim and Moti Yung, editors, Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23–25, Revised Selected Papers, volume 3325 of Lecture Notes in Computer Science, pages 73–86. Springer-Verlag, 2004.
Ryuichi Sakai, Kiyoshi Ohgishi, and Masao Kasahara. Cryptosystems based on Pairing over Elliptic Curve. In Proceedings of Symposium on Cryptography and Information Security (SCIS 2000) C-20, 2000.
Aaditeshwar Seth. Personal Communication, September 2004.
Aaditeshwar Seth, Patrick Darragh, and Srinivasan Keshav. A Generalized Architecture for Tetherless Computing in Disconnected Networks. Manuscript.
Tsz Hon Yuen and Victor K. Wei. Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. In A. J. Menezes, editor, Topics in Cryptology-CT-RSA 2005, The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, Febrary 14–18, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, San Francisco, CA, USA, February 2005. Springer. To Appear. Also available at Cryptology ePrint Archive, Report 2004/121.
Yuliang Zheng. Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption). In Burton S. Kaliski Jr., editor, Advances in Cryptology: Proceedings of CRYPTO 1997 5th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 1997, volume 1294 of Lecture Notes in Computer Science, pages 165–179. Springer-Verlag, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Chow, S.S.M., Yuen, T.H., Hui, L.C.K., Yiu, S.M. (2005). Signcryption in Hierarchical Identity Based Cryptosystem. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_29
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_29
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)