Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption.

Yuyang Zhou,Zhaoqi Li,Fei Hu,Fagen Li
DOI: https://doi.org/10.1007/978-981-10-7590-2_1
2017-01-01
Abstract:Signature, encryption, and signcryption are three basic cryptographic primitives in the public key cryptography. In this paper, we discuss identity-based combined public key schemes in three cryptographic primitives environment, signature, encryption, and signcryption. The advantage of using combined public key scheme is to reduce the task of key management, where the same key pair is applied for signature, encryption, and signcryption. We give an identity-based combined signature and encryption (IBCSE) method based on Cha and Cheon’s signature and Boneh and Franklin’s encryption. In addition, we point out that the security notions for combined signature, encryption and signcryption defined by Paterson et al. in ASIACRYPT 2011 are too strong. We define relatively weak but more reasonable security notions for identity-based combined signature, encryption and signcryption (IBCSESC). We give a weakly secure IBCSESC scheme that satisfies our weak security notions and a strongly secure IBCSESC scheme that satisfies strong security notions.
What problem does this paper attempt to address?