Cryptology ePrint Archive: Report 2014/162


Hu Xiong

Abstract: Signcryption is a useful paradigm which simultaneously offers both the functions of encryption and signature in a single logic step. It would be interesting to make signcryption certificateless to ease the heavy burden of certificate management in traditional public key cryptography (PKC) and solve the key escrow problem in Identity-based public key cryptography (ID-PKC). Most certificateless signcryption (CL-SC) schemes are constructed in the random oracle model instead of the standard model. By exploiting Bellare and Shoup's one-time signature, Hwang et al.'s certificateless encryption and Li et al.'s identity-based signcryption, this paper proposes a new CL-SC scheme secure in the standard model. It is proven that our CL-SC scheme satisfies semantic security and unforgeability against the outside adversary and malicious-but-passive key generation center (KGC) assuming the hardness of bilinear decision Diffie-Hellman (BDDH) and computational Diffie-Hellman (CDH) problems. Our security proofs do not depend on random oracles.

Category / Keywords: public-key cryptography / Information Security; Certificateless cryptography; Signcryption; Standard model

Date: received 3 Mar 2014

Contact author: xionghu uestc at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20140303:221535 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]