Abstract: ETRI JournalVolume 34, Issue 3 p. 421-428 Regular PaperFree Access Provably Secure Aggregate Signcryption Scheme Xun-Yi Ren, Xun-Yi RenSearch for more papers by this authorZheng-Hua Qi, Zheng-Hua QiSearch for more papers by this authorYang Geng, Yang GengSearch for more papers by this author Xun-Yi Ren, Xun-Yi RenSearch for more papers by this authorZheng-Hua Qi, Zheng-Hua QiSearch for more papers by this authorYang Geng, Yang GengSearch for more papers by this author First published: 01 June 2012 https://doi.org/10.4218/etrij.12.0111.0215Citations: 8 Xun-Yi Ren (phone: +86 13611586255, [email protected]), Zheng-Hua Qi ([email protected]), and Yang Geng ([email protected]) are with the Computer College, Nanjing University of Posts and Telecommunications, Jiang Su, China. AboutPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onFacebookTwitterLinked InRedditWechat Abstract An aggregate signature scheme is a digital signature scheme that allows aggregation of n distinct signatures by n distinct users on n distinct messages. In this paper, we present an aggregate signcryption scheme (ASC) that is useful for reducing the size of certification chains (by aggregating all signatures in the chain) and for reducing message size in secure routing protocols. The new ASC scheme combines identity-based encryption and the aggregation of signatures in a practical way that can simultaneously satisfy the security requirements for confidentiality and authentication. We formally prove the security of the new scheme in a random oracle model with respect to security properties IND-CCA2, AUTH-CMA2, and EUF-CMA. Citing Literature Volume34, Issue3June 2012Pages 421-428 ReferencesRelatedInformation