Computer Science ›› 2014, Vol. 41 ›› Issue (11): 208-211.doi: 10.11896/j.issn.1002-137X.2014.11.041

Previous Articles     Next Articles

Efficient Certificateless Ring Signcryption Scheme

SUN Hua and MENG Kun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Ring signcryption is an important cryptographic primitive which combines the functions of encryption and ring signature.It can provide confidentiality,authenticity and anonymity simultaneously.At present,most of existing certificateless ring signcryption schemes are proposed in the random oracle,however,they sometimes are proven to be insecure when the hash functions are instantiated.Aiming at this problem,a certificateless ring signcryption scheme was put forward without random oracles in this paper.Meanwhile,it was proven that this scheme satisfies indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen message attacks under the computational Diffie-Hellman assumption and decisional Diffie-Hellman assumption,so the scheme is secure and reliable.

Key words: Ring signcryption,Certificateless public key cryptography,CDH problem,DBDH problem

[1] Al-Riyami S S,Paterson K G.Certificateless public key cryptog-raphy[C]∥Proceedings of ASIACRYPT 2003.Berlin:Springer-Verlag,2003:452-473
[2] Waters B.Efficient identity-based encryption without randomoracles[C]∥Proceedings of EUROCRYPT 2005.Berlin:Springer-Verlag,2005:114-127
[3] Gentry C.Practical identity-based encryption without randomoracles[C]∥Proceedings of EUROCRYPT 2006.Berlin:Springer-Verlag,2006:445-464
[4] Zheng Y L.Digital signcryption or how to achieve cost(signature & encryption) << cost(signature)+cost(encryption)[C]∥Proceedings of CRYPTO 1997.Berlin:Springer-Verlag,1997:165-179
[5] Rivest R L,Shamir A,Tauman Y.How to leak a secret[C]∥Proceedings of ASIACRYPT 2001.Berlin:Springer-Verlag,2001:552-565
[6] Huang X Y,Susilo W,Mu Y,et al.Identity-based ring signcryption schemes:cryptographic primitives for preserving privacy and authenticity in the ubiquitous world[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Applications.Washington DC,IEEE Computer Society,2005:649-654
[7] Zhang M,Yang B,Zhu S,et al.Efficient secret authenticatableanonymous signcryption scheme with identity privacy[C]∥Proceedings of Intelligence and Security Informatics(ISI 2008).Berlin:Springer-Verlag,2008:126-137
[8] Li F G,Masaaki S,Tsuyoshi T.Analysis and improvement of authenticatable ring signcryption scheme[J].Journal of Shanghai Jiaotong University(Science),2008,13(6):679-683
[9] Zhun L J,Zhang F T.Efficient id-based ring signature and ring signcryption schemes[C]∥Proceedings of CIS 2008.IEEE Press,2008:303-307
[10] Zhu Z C,Zhang Y Q,Wang F J.An efficient and provable secure identity-based ring signcryption scheme[J].Computer Standards & Interfaces,2009,31(6):1092-1097
[11] Sharmila D S S,Sree V S,Pandu R C.On the security of identity based ring signcryption schemes[C]∥Proceedings of ISC 2009.Berlin:Springer-Verlag,2009:310-325
[12] Zhao Z M,Yu T,Ren X F.Efficient identity-based ring sign-cryption scheme in the standard model[EB/OL].[2013-03-20].http://www.joics.com/publishedpapers/2013_10_5_1471_1478.pdf
[13] Sun H,Wang A M,Zheng X F.Provably secure identity-based threshold ring signcryption scheme in standard model[J].Computer Science,2013,40(5):131-135
[14] Zhu L J,Zhang F T,Miao S Q.A provably secure parallel certifi-cateless ring signcryption scheme[C]∥Proceedings of 2010 International Conference on Multimedia Information Networking and Security.IEEE Press,2010:423-427
[15] Qi Z H,Yang G,Ren X Y.Provably secure certificateless ring signcryption scheme[J].China Communications,2011,8(3):99-106
[16] Qin H S,Zhang L,Feng Y Q,et al.Certificateless ring signcryption scheme without paring design[J].Computer Engineering and Design,2013,34(3):841-844

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!