A post-quantum communication secure identity-based proxy-signcryption scheme Online publication date: Thu, 28-May-2015
by Xiaojun Zhang; Chunxiang Xu; Chunhua Jin; Junwei Wen
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 7, No. 2, 2015
Abstract: Proxy-signcryption is a variation of an ordinary signcryption scheme and has been used in many applications where the delegation of rights is quite common. In a proxy-signcryption scheme, an original signcrypter needs to delegate his signcryption capability to a proxy signcrypter to signcrypt messages on behalf of the original signcrypter. By combining the functionalities of proxy signature with identity-based signcryption, in this paper, we propose a novel identity-based proxy-signcryption scheme (IBPSC) from lattice assumptions in the random oracle model. Meanwhile, the security requirements of our IBPSC scheme have been analysed, and our scheme can even resist quantum computer attacks. Compared with existing IBPSC schemes, our scheme is more secure and more efficient. To the best of our knowledge, there is still no relevant IBPSC scheme based on lattice, which is an interesting stepping stone in the post-quantum cryptographic communication.
Online publication date: Thu, 28-May-2015
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org