Computer Science ›› 2015, Vol. 42 ›› Issue (3): 106-110.doi: 10.11896/j.issn.1002-137X.2015.03.022

Previous Articles     Next Articles

Ring Signcryption Broadcasting Scheme Based on Multilinear Maps

YU Zhi-min, JING Zheng-jun and GU Chun-sheng   

  • Online:2018-11-14 Published:2018-11-14

Abstract: We proposed a ring signcryption scheme based on multilinear maps.Each ring member can represent ring group to generate anonymous signcryption and broadcast it to multiple recipients.Ring signcryption can be communicated between two ring groups.The scheme meets the security requirements of ring signcryption broadcasting like the confidentiality of messages,unforgeability and anonymity.In the random oracle model,the security of the scheme is reduced to grading decisional Diffie-Hellman problem (GDDH) to solve.

Key words: Ring signcryption,Multilinear maps,Confidentiality,Unforgeability,Anonymity,GDDH

[1] Rivest R L,Shamir A,Tauman Y.How to leak a secret[C]∥Advances in Cryptology-ASIACRYPT 2001.Berlin:Springer-Verlag,2001:552-565
[2] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature&encryption)< [3] 孙华,王爱民,郑雪峰.标准模型下可证安全的基于身份的门限环签密方案[J].计算机科学,2013,0(5):131-135
[4] Huang X Y,Zhang F T,Wu W.Identity-based ring signcryption scheme[J].Tien Tzu Hsueh Pao/Acta Electronica Sinica,2006,4(2):263-266
[5] Selvi S S D,Vivek S S,Rangan C P.On the security of identity based ring signcryption schemes[C]∥Information Security,12th International Conference(ISC 2009).Berlin:Springer-Verlag,2009:310-325
[6] Deng Lun-zhi,Liu Cheng-lian,Wang Xiang-bin.An ImprovedIdentity-Based Ring Signcryption Scheme[J].Information Security Journal:A Global Perspective,2013,22(1):46-54
[7] Sharmila D S S,Sree V S,Pandu R C.Identity based ring signcryption schemes revisited[J].Journal of Math-for-Industry,2011,3(A3):33-46
[8] Zhang Bo,Xu Qiu-liang.An ID-based anonymous signcryptionscheme for multiple receivers secure in the standard model:Advances in Computer Science and Information Technology[C]∥AST/UCMA/ISA/ACN 2010 Conferences.Berlin:Springer-Verlag,2010:15-27
[9] 鲁力,胡磊.基于Weil对的多接收者公钥加密方案[J].软件学报,2008,9(8):2159-2166
[10] 庞辽军,高璐,裴庆祺,等.基于身份公平的匿名多接收者签密方案[J].通信学报,2013,4(8):161-168
[11] 李慧贤,陈绪宝,巨龙飞,等.改进的多接收者签密方案[J].计算机研究与发展,2013,0(7):1418-1425
[12] Shor P W.Polynomial-time algorithms for prime factorizationand discrete logarithms on a quantum computer[J].SIAM J Comput,1997,26(5):1484-1509
[13] Boneh D,Silverberg A.Applications of multilinear forms tocryptography[J].Contemporary Mathematics,2003,324:71-90
[14] Garg S,Gentry C,Halevi S.Candidate multilinear maps fromideal lattices[C]∥Advances in Cryptology(EUROCRYPT 2013).Berlin:Springer-Verlag,2013:1-17
[15] Coron J-S,de Lepoint T,Tibouchi M.Practical multilinear maps over the integers[C]∥Advances in Cryptology(CRYPTO 2013).Berlin:Springer-Verlag,2013:476-493
[16] Hohenberger S,Sahai A,Waters B.Full domain hash from (le-veled) multilinear maps and identity-based aggregate signatures [EB/OL].2013-7.http://eprint.iacr.org/2013/434.pdf

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!