H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud
{"title":"An efficient identity-based signeryption scheme without bilinear pairings","authors":"H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud","doi":"10.1109/ICCES.2013.6707176","DOIUrl":null,"url":null,"abstract":"Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2013.6707176","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.