## CryptoDB

### Paper: Signcryption in Hierarchical Identity Based Cryptosystem

Authors: Sherman S.M. Chow Tsz Hon Yuen Lucas C.K. Hui S.M. Yiu URL: http://eprint.iacr.org/2004/244 Search ePrint Search Google In many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to "sign-then-encrypt" the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in \cite{CryptoePrint:2003:023}. The first one is to devise an efficient forward-secure signcryption scheme with public verifiability and public ciphertext authenticity, which is promptly closed by \cite{LNCS2971:ICISC2003:CYHC}. Another one which still remains open is to devise a hierarchical ID-based signcryption scheme that allows the user to receive signcrypted messages from sender who is under another sub-tree of the hierarchy. This paper aims at solving this problem by proposing two concrete constructions of hierarchical ID-based signcryption.
##### BibTeX
@misc{eprint-2004-12213,
title={Signcryption in Hierarchical Identity Based Cryptosystem},
booktitle={IACR Eprint archive},
keywords={public-key cryptography / ID-based cryptography, Signcryption, Hierarchical ID-based Cryptosystem, Bilinear pairings},
url={http://eprint.iacr.org/2004/244},
note={To appear in Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan. smchow@cs.hku.hk 12829 received 21 Sep 2004, last revised 15 Feb 2005},
author={Sherman S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M. Yiu},
year=2004
}