H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud
{"title":"无双线性对的高效身份签名方案","authors":"H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud","doi":"10.1109/ICCES.2013.6707176","DOIUrl":null,"url":null,"abstract":"Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An efficient identity-based signeryption scheme without bilinear pairings\",\"authors\":\"H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud\",\"doi\":\"10.1109/ICCES.2013.6707176\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.\",\"PeriodicalId\":277807,\"journal\":{\"name\":\"2013 8th International Conference on Computer Engineering & Systems (ICCES)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 8th International Conference on Computer Engineering & Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2013.6707176\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2013.6707176","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An efficient identity-based signeryption scheme without bilinear pairings
Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.