Provably Secure Identity-Based Threshold Unsigncryption Scheme

  • Bo Yang
  • Yong Yu
  • Fagen Li
  • Ying Sun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)


Signcryption is a cryptographic primitive that performs signature and encryption simultaneously. In this paper, we propose an identity based threshold unsigncryption scheme, which is the organic combination of the signcryption scheme, the (t,n) threshold scheme and zero knowledge proof for the equality of two discrete logarithms based on the bilinear map. In this scheme, a signcrypted message can be decrypted only when at least t members join an unsigncryption protocol. We also prove its security in a formal model under recently studied computational assumptions and in the random oracle model. Specifically, we prove its semantic security under the hardness of q-Bilinear Diffie-Hellman Inversion problem and its unforgeability under the q-Strong Diffie-Hellamn assumption.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Shamir, A.: Identity-based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 120–126. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature)+cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  3. 3.
    Petersen, H., Michels, M.: Cryptanalysis and improvement of signcryption schemes. IEE proceedings-Computers and Digital Techniques 145(2), 149–151 (1998)CrossRefGoogle Scholar
  4. 4.
    Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55–59. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227–233 (1998)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Malone-Lee, J., Mao, W.: Two birds one stone: signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211–226. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive. Report 2002/098 (2002)Google Scholar
  8. 8.
    Libert, B., Quisquator, J.J.: A new identity based signcryption scheme from pairings. In: 2003 IEEE information theory workshop. Paris, France, pp. 155–158 (2003)Google Scholar
  9. 9.
    Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)Google Scholar
  10. 10.
    Boyen, X.: Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)Google Scholar
  11. 11.
    Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005)Google Scholar
  12. 12.
    Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 291–312. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  14. 14.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)Google Scholar
  15. 15.
    Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals E81-A(1), 20–26 (1998)MathSciNetGoogle Scholar
  16. 16.
    Koo, J.H., Kim, H.J., Jeong, I.R.: Jointly unsigncryption signcryption schemes. In: Proceedings of WISA 2001, pp. 397–407 (2001)Google Scholar
  17. 17.
    Li, F., Gao, J., Hu, Y.: ID-based threshold unsigncryption scheme from pairings. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 242–253. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  18. 18.
    Baek, J., Zheng, Y.: Identity-based threshold decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 262–276. Springer, Heidelberg (2004)Google Scholar
  19. 19.
    Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive, Report 2002/098 (2002). Available at:
  20. 20.
    Pointcheval, D., Stern, J.: Security arguments for digital signature and blind signature. Journal of Cryptology 13(3), 361–396 (2000)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Bo Yang
    • 1
  • Yong Yu
    • 2
  • Fagen Li
    • 3
  • Ying Sun
    • 1
  1. 1.College of information, South China Agricultural University, Guangzhou, 510642P.R. China
  2. 2.National Key Lab. of ISN, Xidian University, Xi’an, 710071P.R. China
  3. 3.School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 610054China

Personalised recommendations