Multipurpose identity-based signcryption : a Swiss army knife for identity-based cryptography

Boyen, Xavier (2003) Multipurpose identity-based signcryption : a Swiss army knife for identity-based cryptography. In Advances in Cryptology - CRYPTO 2003 : Proceedings of the 23rd Annual International Cryptology Conference, Springer Verlag, Santa Barbara, California, USA, pp. 383-399.

View at publisher


Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered.

We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone.

We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.

Impact and interest:

172 citations in Scopus
Search Google Scholar™
149 citations in Web of Science®

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

181 since deposited on 02 Apr 2013
34 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 58800
Item Type: Conference Paper
Refereed: No
Additional Information: DOI: 10.1007_978-3-540-45146-4_23
ISBN: 9783540406747
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2003 International Association for Cryptologic Research
Copyright Statement: The original publication is available at
Deposited On: 02 Apr 2013 01:23
Last Modified: 23 Apr 2013 15:57

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page