International Association for Cryptologic Research

International Association
for Cryptologic Research


Paper: Signcryption in Hierarchical Identity Based Cryptosystem

Sherman S.M. Chow
Tsz Hon Yuen
Lucas C.K. Hui
S.M. Yiu
Search ePrint
Search Google
Abstract: In many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to "sign-then-encrypt" the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in \cite{CryptoePrint:2003:023}. The first one is to devise an efficient forward-secure signcryption scheme with public verifiability and public ciphertext authenticity, which is promptly closed by \cite{LNCS2971:ICISC2003:CYHC}. Another one which still remains open is to devise a hierarchical ID-based signcryption scheme that allows the user to receive signcrypted messages from sender who is under another sub-tree of the hierarchy. This paper aims at solving this problem by proposing two concrete constructions of hierarchical ID-based signcryption.
  title={Signcryption in Hierarchical Identity Based Cryptosystem},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / ID-based cryptography, Signcryption, Hierarchical ID-based Cryptosystem, Bilinear pairings},
  note={To appear in Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan. 12829 received 21 Sep 2004, last revised 15 Feb 2005},
  author={Sherman S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M. Yiu},