In this paper, we show how to construct an Identity Based Signcryption Scheme (IBSC) using an Identity Based Encryption (IBE) and an Identity Based Signature (IBS) schemes. We show that the security of the IBSC scheme-indistinguishability as well as unforgeablity-is derived from the security of the underlying IBE and IBS schemes. Moreover, we show that under mild (reasonable) assumptions, the scheme is both space and time efficient compared to the Sign-then-Encrypt approach. © 2011 Springer-Verlag.
CITATION STYLE
Pandey, S. K., & Barua, R. (2011). Construction of identity based signcryption schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6513 LNCS, pp. 1–14). Springer Verlag. https://doi.org/10.1007/978-3-642-17955-6_1
Mendeley helps you to discover research relevant for your work.