<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf23102</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2012.347</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Identity-Based Key-Insulated Signcryption</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Chen</surname>
						<given-names>Jianhong</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_002"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Chen</surname>
						<given-names>Kefei</given-names>
					</name>
					<email xlink:href="mailto:chen-kf@cs.sjtu.edu.cn">chen-kf@cs.sjtu.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_002"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Wang</surname>
						<given-names>Yongtao</given-names>
					</name>
					<email xlink:href="mailto:wyt_sjtu@yahoo.com.cn">wyt_sjtu@yahoo.com.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_002"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Li</surname>
						<given-names>Xiangxue</given-names>
					</name>
					<email xlink:href="mailto:xxli@cs.ecnu.edu.cn">xxli@cs.ecnu.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_003"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Long</surname>
						<given-names>Yu</given-names>
					</name>
					<email xlink:href="mailto:longyu@sjtu.edu.cn">longyu@sjtu.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Wan</surname>
						<given-names>Zhongmei</given-names>
					</name>
					<email xlink:href="mailto:wan-zmei@163.com">wan-zmei@163.com</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_004"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Computer Science and Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai 200240, China</aff>
				<aff id="j_INFORMATICA_aff_001">School of Computer Engineering, Huaiyin Institute of Technology</aff>
				<aff id="j_INFORMATICA_aff_002">Shanghai Key Laboratory of Scalable Computing and System, Shanghai Jiao Tong University</aff>
				<aff id="j_INFORMATICA_aff_003">Department of Computer Science and Technology, East China Normal University, 500 Dongchuan Road, Shanghai 200241, China</aff>
				<aff id="j_INFORMATICA_aff_004">College of Science, Hohai University, 1 Xikang Road, Nanjing 210098, China</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2012</year>
			</pub-date>
			<volume>23</volume>
			<issue>1</issue>
			<fpage>27</fpage>
			<lpage>45</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>04</month>
					<year>2009</year>
				</date>
				<date date-type="accepted">
					<day>01</day>
					<month>09</month>
					<year>2011</year>
				</date>
			</history>
			<abstract>
				<p>Key-insulated cryptography is an important technique to protect private keys in identity-based (IB) cryptosytems. Despite the flurry of recent results on IB key-insulated encryption (IBKIE) and signature (IBKIS), a problem regarding the security and efficiency of practicing IBKIE and IBKIS as a joint IB key-insulated signature/encryption scheme with a common set of parameters and keys remains open. To deal with the above question, we propose an identity-based key-insulated signcryption (IBKISC) scheme. Compared with the Sign-then-Encrypt (StE) and Encrypt-then-Sign (EtS) using IBKIE and IBKIS in the standard model, our proposed IBKISC scheme is the fastest with the shortest ciphertext size.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>key-insulated</kwd>
				<kwd>signcryption</kwd>
				<kwd>standard model</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>