Computer Science ›› 2013, Vol. 40 ›› Issue (5): 131-135.

Previous Articles     Next Articles

Provably Secure Identity-based Threshold Ring Signcryption Scheme in Standard Model

SUN Hua,WANG Ai-min and ZHENG Xue-feng   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Signcryption is a cryptographic primitive which can provide authentication and confidentiality simultaneously with a computational cost lower than signing and encryption respectively,while the ring signcryption has anonymity in addition to authentication and confidentiality.In order to design an identity-based threshold ring signcryption,this paper presented an efficient identity-based threshold ring signcryption scheme without random oracles by means of secret sharing and bilinear pairing technique,and gave security analysis of the scheme.At last,we proved this scheme satisfies indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen message and identity attacks in terms of the hardness of DBDH problem and CDH problem.

Key words: Threshold ring signcryption,Bilinear pairing,Computational Diffie-Hellman problem,Decisional bilinear Diffie-Hellman problem,Identity based cryptography

[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of Crypto 1984.volume 196of LNCS,1984:47-53
[2] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]∥Proceedings of Crypto 2001.volume 2139of LNCS,2001:213-229
[3] Florian Hess.Efficient identity based signature schemes basedon pairings[C]∥Proceedings of SAC 2002.volume 2595of LNCS,2002:310-324
[4] Paterson K G,Schuldt J C N.Efficient identity-based signatures secure in the standard model[C]∥Proceedings of ACISP 2006.volume 4058of LNCS,2006:207-222
[5] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature & encryption)cost(signature)+cost(encryption) [C]∥Advances in Cryptology-Crypto 1997.volume 1294of LNCS,Springer-Verlag,1997:165-179
[6] Duan S S,Cao Z F,Lu R X.Robust id-based threshold signcryption scheme from pairings[C]∥Proceedings of the 3rd International Conference on Information Security.ACM,2004:33-37
[7] Peng C G,Li X.An identity-based threshold signcryption sch-eme with semantic security[C]∥Proceedings of CIS 2005.volume 3802of LNCS,Springer-Verlag,2005:173-179
[8] Li F G,Yu Y.An efficient and provably secure id-based thre-shold signcryption scheme[C]∥Proceedings of ICCCAS 2008.IEEE Press,2008:488-492
[9] Zhu Z C,Zhang Y Q,Wang F J.The analysis of an efficient and provably secure id-based threshold signcryption scheme and its secure version[C]∥Proceedings of the Second International Conference on Provable Security.volume 5324of LNCS,Springer Verlag,2008:210-225
[10] Huang Xin-yi,Susilo W,Mu Yi,et al.Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authenticity in the ubiquitous world[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Application 2005.volume 2,2005:649-654
[11] Zhang M W,Yang B,Zhu S L,et al.Efficient secret authenticata-ble anonymous signcryption scheme with identity privacy[C]∥Proceedings of IEEE ISI 2008.volume 5075of LNCS,Springer-Verlag,2008:126-137
[12] Zhun L J,Zhang F T.Efficient id-based ring signature and ring signcryption schemes[C]∥Proceedings of CIS 2008.IEEE Press,2008:303-307
[13] Zhu Z C,Zhang Y Q,Wang F J.An efficient and provable secure identity-based ring signcryption scheme[J].Computer Standards & Interfaces,2009,31:1092-1097
[14] Sharmila Deva Selvi S,Sree Vivek S,Pandu Rangan C.On the security of identity based ring signcryption schemes [C]∥Proceedings of the 12th International Conference on Information Security.volume 5735of LNCS,Springer-Verlag,2009:310-325
[15] 罗大文,何明星,李虓.基于身份的门限环签密方案[J].计算机工程与应用,2011,47(33):65-67

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!