Premium
Understanding signcryption security in standard model
Author(s) -
Dharminder Dharminder,
Mishra Dheerendra
Publication year - 2020
Publication title -
security and privacy
Language(s) - English
Resource type - Journals
ISSN - 2475-6725
DOI - 10.1002/spy2.105
Subject(s) - signcryption , random oracle , computer science , standard model (mathematical formulation) , encryption , mathematical proof , theoretical computer science , correctness , ciphertext , provable security , block cipher , cryptanalysis , computer security , mathematics , algorithm , public key cryptography , geometry , archaeology , gauge (firearms) , history
Abstract Signcryption is an advanced technique that combines both signature and encryption in one step which costs lower than any ordinary signature‐then‐encryption technique. Many ID‐based signcryption ( ℐℬ SC ) techniques have been constructed, but they are considered secure in the random Oracle (RO) model, where the proofs in this environment are criticized as it always depends on the assumption that Oracle is truly random. This assumption of RO is not possible in reality. Therefore, many of the ID‐based signcryptions were proposed in the widely accepted standard model. As signcryption schemes have much important application, the verification of their correctness, security, and performance are required. In this article, we have discussed two important security features in the standard model under decision bilinear Diffie‐Hellman (DBDH) and computational Diffie‐Hellman(CDH) assumptions, namely, (a) indistinguishable against chosen cipher text attack and (b) indistinguishable against chosen‐plaintext attack. To understand the security of existing schemes, we present cryptanalysis, which illustrates weak security. The study on performance is also performed to analyze the communication and computational efficiency. The study of performance and security analysis helps us to understand the requirement of signcryption scheme in standard model.