{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:11:30Z","timestamp":1760242290073,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:00:00Z","timestamp":1489708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting. In this paper, motivated by Paterson\u2013Schuldt\u2019s scheme, based on bilinear pairing, we first proposed an identity based generalized signcryption (IDGSC) scheme in the standard model. To the best of our knowledge, it is the first scheme that is proven secure in the standard model.<\/jats:p>","DOI":"10.3390\/e19030121","type":"journal-article","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:22:56Z","timestamp":1489749776000},"page":"121","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Identity Based Generalized Signcryption Scheme in the Standard Model"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1110-2566","authenticated-orcid":false,"given":"Xiaoqin","family":"Shen","sequence":"first","affiliation":[{"name":"School of Sciences, Xi\u2019an University of Technology, Xi\u2019an 710054, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1734-8866","authenticated-orcid":false,"given":"Yang","family":"Ming","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Chang\u2019an University, Xi\u2019an 710064, China"}]},{"given":"Jie","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Chang\u2019an University, Xi\u2019an 710064, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zheng, Y. (1997, January 17\u201321). Digital signcryption or how to achieve cost(signature & encryption) \u226a cost(signature) + cost(encryption). Proceedings of the Advances in Cryptology-Crypto\u201997, LNCS 1294, Santa Barbara, CA, USA.","DOI":"10.1007\/BFb0052234"},{"key":"ref_2","unstructured":"Linn, J. Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. Available online: https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc1421.txt.pdf."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","article-title":"How to construct efficient signcryption schemes on elliptic curves","volume":"68","author":"Zheng","year":"1998","journal-title":"Inf. Process. Lett."},{"key":"ref_4","unstructured":"Bao, F., and Deng, R.H. (, January 5\u20136). A signcryption scheme with signature directly verifiable by public key. Proceedings of the Public Key Cryptography-PKC\u201998, LNCS 1431, Yokohama, Japan."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Malone-Lee, J., and Mao, W. (2003, January 13\u201317). Two birds one stone: Signcryption using RSA. Proceedings of the Topics in Cryptology-CT-RSA\u201903, LNCS 2612, San Francisco, CA, USA.","DOI":"10.1007\/3-540-36563-X_14"},{"key":"ref_6","unstructured":"Shamir, A. (1984, January 19\u201322). Identity-based cryptosystems and signature schemes. Proceedings of the Advances in Cryptology-CRYPTO\u201984, LNCS 196, Santa Barbara, CA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Franklin, M. (2001, January 19\u201323). Identity-based encryption from the weil pairing. Proceedings of the Advances in Cryptology-CRYPTO\u201901, LNCS 2139, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref_8","unstructured":"Malone-Lee, J. Identity Based Signcryption. Available online: http:\/\/eprint.iacr.org\/2002\/098."},{"key":"ref_9","unstructured":"Libert, B., and Quisquator, J.J. (April, January 31). A new identity based signcryption scheme from pairings. Proceedings of the IEEE Information Theory Workshop-ITW\u201903, Paris, France."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K., and Chow, K.P. (2004, January 27\u201328). Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. Proceedings of the Information Security and Cryptology-ICISC\u201903, LNCS 2971, Seoul, Korea.","DOI":"10.1007\/978-3-540-24691-6_26"},{"key":"ref_11","unstructured":"Boyen, X. (2003, January 17\u201321). Multipurpose identity based signcryption: A Swiss army knife for identity based cryptography. Proceedings of the Advance in Cryptology-CRYPTO\u201903, LNCS 2729, Santa Barbara, CA, USA."},{"key":"ref_12","unstructured":"Chen, L., and Malone-Lee, J. (2005, January 23\u201326). Improved identity-based signcryption. Proceedings of the Public Key Cryptography-PKC\u201905, LNCS 3386, Les Diablerets, Switzerland."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., and Quisquater, J.J. (2005, January 4\u20138). Efficient and provably-secure identity based signatures and signcryption from bilinear maps. Proceedings of the Advance in Cryptology-ASIACRYPT\u201905, LNCS 3788, Chennai, India.","DOI":"10.1007\/11593447_28"},{"key":"ref_14","unstructured":"Selvi, S.S.D., Vivek, S.S., and Rangan, C.P. (2010, January 13\u201315). Identity based public verifiable signcryption scheme. Proceedings of the ProvSec\u201910, LNCS 6402, Malacca, Malaysia."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.csi.2007.10.014","article-title":"Identity based signcryption scheme without random oracles","volume":"31","author":"Yu","year":"2009","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.compeleceng.2009.12.009","article-title":"An improved semantically-secure identity-based signcryption scheme in the standard model","volume":"36","author":"Jin","year":"2010","journal-title":"Comput. Electr. Eng."},{"key":"ref_17","unstructured":"Li, F., Muhaya, F.B., Zhang, M., and Takagi, T. (2011, January 16\u201318). Efficient identity-based signcryption in the standard model. Proceedings of the ProvSec\u201911, LNCS 6980, Xi\u2019an, China."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Han, Y., and Yang, X. ECGSC: Elliptic Curve Based Generalized Signcryption Scheme. Available online: http:\/\/eprint.iacr.org\/2006\/126.","DOI":"10.1007\/11833529_97"},{"key":"ref_19","unstructured":"Wang, X., Yang, Y., and Han, Y. Provable Secure Generalized Signcryption. Available online: http:\/\/eprint.iacr.org\/2007\/173."},{"key":"ref_20","unstructured":"Lal, S., and Kushwah, P. ID Based Generalized Signcryption. Available online: http:\/\/eprint.iacr.org\/2008\/084."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3614","DOI":"10.1016\/j.tcs.2010.06.003","article-title":"Provable secure identity based genrealized signcryption schem","volume":"411","author":"Yu","year":"2010","journal-title":"Theor. Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"6382","DOI":"10.1016\/j.tcs.2011.08.009","article-title":"An efficient identity based generalized signcryption scheme","volume":"412","author":"Kushwah","year":"2011","journal-title":"Theor. Comput. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Rogaway, P. (1996, January 9\u201312). The exact security of digital signatures-how to sign with RSA and Rabin. Proceedings of the Advances in Cryptology-EUROCRYPT\u201996, LNCS 0950, Kenmare, Ireland.","DOI":"10.1007\/3-540-68339-9_34"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., and Halevi, S. (1998, January 23\u201326). The random oracle methodology, revisited. Proceedings of the Annual Symposium on the Theory of Computing-STOC\u201998, Dallas, TX, USA.","DOI":"10.1145\/276698.276741"},{"key":"ref_25","unstructured":"Paterson, K.G., and Schuldt, J.C.N. (2006, January 3\u20135). Efficient identity based signatures secure in the standard mode. Proceedings of the Information Security and Privacy-ACISP\u201906, LNCS 4058, Melbourne, Australia."},{"key":"ref_26","unstructured":"Waters, R. (2005, January 22\u201326). Efficient identity based encryption without random oracles. Proceedings of the Advance in Cryptology-Eurocrypt\u201905, LNCS 3494, Aarhus, Denmark."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Canetti, R., Halevi, S., and Kate, J. (2004, January 2\u20136). Chosen-ciphertext security from identity-based encryption. Proceedings of the Advance in Cryptology-Eurocrypt\u201904, LNCS 3027, Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"ref_28","unstructured":"Shamus Software Ltd. MIRACL Library. Available online: http:\/\/www.shamus.ie\/index.php?page=home."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/19\/3\/121\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:30:39Z","timestamp":1760207439000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/19\/3\/121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,17]]},"references-count":28,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,3]]}},"alternative-id":["e19030121"],"URL":"https:\/\/doi.org\/10.3390\/e19030121","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2017,3,17]]}}}