Loading…

Understanding signcryption security in standard model

Signcryption is an advanced technique that combines both signature and encryption in one step which costs lower than any ordinary signature‐then‐encryption technique. Many ID‐based signcryption (ℐℬSC) techniques have been constructed, but they are considered secure in the random Oracle (RO) model, w...

Full description

Saved in:
Bibliographic Details
Published in:Security and privacy 2020-05, Vol.3 (3), p.n/a
Main Authors: Dharminder, Dharminder, Mishra, Dheerendra
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Signcryption is an advanced technique that combines both signature and encryption in one step which costs lower than any ordinary signature‐then‐encryption technique. Many ID‐based signcryption (ℐℬSC) techniques have been constructed, but they are considered secure in the random Oracle (RO) model, where the proofs in this environment are criticized as it always depends on the assumption that Oracle is truly random. This assumption of RO is not possible in reality. Therefore, many of the ID‐based signcryptions were proposed in the widely accepted standard model. As signcryption schemes have much important application, the verification of their correctness, security, and performance are required. In this article, we have discussed two important security features in the standard model under decision bilinear Diffie‐Hellman (DBDH) and computational Diffie‐Hellman(CDH) assumptions, namely, (a) indistinguishable against chosen cipher text attack and (b) indistinguishable against chosen‐plaintext attack. To understand the security of existing schemes, we present cryptanalysis, which illustrates weak security. The study on performance is also performed to analyze the communication and computational efficiency. The study of performance and security analysis helps us to understand the requirement of signcryption scheme in standard model.
ISSN:2475-6725
2475-6725
DOI:10.1002/spy2.105