Title: A post-quantum communication secure identity-based proxy-signcryption scheme

Authors: Xiaojun Zhang; Chunxiang Xu; Chunhua Jin; Junwei Wen

Addresses: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China ' School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China

Abstract: Proxy-signcryption is a variation of an ordinary signcryption scheme and has been used in many applications where the delegation of rights is quite common. In a proxy-signcryption scheme, an original signcrypter needs to delegate his signcryption capability to a proxy signcrypter to signcrypt messages on behalf of the original signcrypter. By combining the functionalities of proxy signature with identity-based signcryption, in this paper, we propose a novel identity-based proxy-signcryption scheme (IBPSC) from lattice assumptions in the random oracle model. Meanwhile, the security requirements of our IBPSC scheme have been analysed, and our scheme can even resist quantum computer attacks. Compared with existing IBPSC schemes, our scheme is more secure and more efficient. To the best of our knowledge, there is still no relevant IBPSC scheme based on lattice, which is an interesting stepping stone in the post-quantum cryptographic communication.

Keywords: proxy signcryption; identity based signcryption; random oracle model; post-quantum cryptographic communication; post-quantum communication; communication security; encryption; cryptography; proxy signatures; quantum computer attacks.

DOI: 10.1504/IJESDF.2015.069607

International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.2, pp.147 - 165

Received: 07 Jan 2015
Accepted: 02 Mar 2015

Published online: 27 May 2015 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article