Efficient certificateless multi-receiver anonymous signcryption scheme

被引:0
|
作者
Qin Y.-L. [1 ]
Wu X.-P. [1 ]
Hu W. [1 ]
机构
[1] Department of Information Security, Naval University of Engineering, Wuhan
来源
| 1600年 / Editorial Board of Journal on Communications卷 / 37期
基金
中国国家自然科学基金;
关键词
Certificateless cryptography; Computational Diffie-Hellman problem; Elliptic curve discrete logarithm problem; Multi-receiver anonymous signcryption; Random oracle;
D O I
10.11959/j.issn.1000-436x.2016122
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
To solve the private key escrow problem of identity-based multi-receiver signcryption schemes, the security model for multi-receiver signcryption scheme was constructed, and then a certificateless multi-receiver signcryption scheme based on ECC was proposed. Furthermore, the security of the scheme in the random oracle was based on the computational Diffie-Hellman assumption and elliptic curve discrete logarithm assumption was proved. Meanwhile, the scheme was free from certificate management center and needed no bilinear paring operation in both signcryption and decryption phases. It can also protect both the sender and receivers' identity from leaking out. So the scheme can be applied conveniently to broadcast signcryption in network environment. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:129 / 136
页数:7
相关论文
共 17 条
  • [1] Zheng Y., Digital signcryption or how to achieve(signature & encryption) <<cost(signature)+cost(encryption), The Crypto'97, pp. 291-312, (1997)
  • [2] Duan S., Cao Z., Efficient and provably secure multi receiver identity based signcryption, The 11th Australasian Conf on Information Security and Privacy (ACISP 2006), pp. 195-206, (2006)
  • [3] Pang L.J., Li H.X., Cui J.J., Et al., Design and analysis of a fair ID based multi-receiver anonymous signcryption, Journal of Software, 25, 10, pp. 2409-2420, (2014)
  • [4] Zhang M.W., Yang B., Tsuyoshi T., Reconciling and improving of multi-receiver signcryption protocols with threshold decryption, Security and Communication Networks, 5, pp. 1430-1440, (2012)
  • [5] Ming Y., Zhao X.M., Wang Y.M., Multi-receiver identity-based signcryption scheme in the standard model, ICICA 2011, pp. 487-494, (2011)
  • [6] Intae K., Seong O.H., Efficient identity-based broadcast signcryption schemes, Security and Communication Networks, 7, 1, pp. 914-925, (2014)
  • [7] Zhang J., Tang W., On the security of Kim et al. two ID-based broadcast signcryption schemes, Security and Communication Networks, 8, 8, pp. 1509-1514, (2015)
  • [8] Zhang B., Xu Q.L., An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model, The AST/UCMA/ ISA/ACN 2010 Conf. on Advances in Computer Science and Information Technology(AST/UCMA/ISA/ACN2010), pp. 15-27, (2010)
  • [9] Nakano R., Shikata J.J., Constructions of signcryption in the multi-user setting from identity-based encryption, IMACC 2013, LNCS 8308, pp. 324-343, (2013)
  • [10] Ahmed F., Masood D.A., Kausar F., An efficient multi recipient signcryption scheme offering non repudiation, 2010 10th IEEE International Conference on Computer and Information Technology, pp. 1577-1581, (2010)