Revocable ID-based signcryption scheme

被引:0
|
作者
Liu, Zhenhua [1 ,2 ,3 ]
Li, Juanjuan [1 ]
Zu, Longhui [1 ]
机构
[1] School of Mathematics and Statistics, Xidian Univ., Xi'an 710126, China
[2] Guangxi Experiment Center of Info. Sci., Guilin Univ. of Electronic Technol., Guilin 541004, China
[3] State Key Lab. of Info. Security, Inst. of Info. Eng., Chinese Academy of Sciences, Beijing 100093, China
关键词
Cryptography;
D O I
暂无
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In order to revoke private key leaks or malicious users in a signcryption system, a new revocable identity-based signcryption scheme was proposed. In this scheme, the master key was randomly divided into two parts, which were used to construct the initial key and generate updated key, respectively. Furthermore, they were used to generate (designcryption) signcryption key randomly, thus the proposed scheme can revoke users and resist key compromise attack. In the standard model, it was shown that the new scheme has IND-CCA2 security under the hardness of DBDH problem and EUF-CMA security under the hardness of CDH problem.
引用
收藏
页码:79 / 86
相关论文
共 50 条
  • [1] An ID-based broadcast signcryption scheme
    Qi, Zheng-Hua
    Ren, Xun-Yi
    Yang, Geng
    Yao, Zhuo-Yu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
  • [2] A Novel ID-Based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Gao, Shengnan
    Chen, Hua
    Geng, Qin
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 604 - 610
  • [3] Comment on an ID-based Broadcast Signcryption Scheme
    Zhang, Jianhong
    Geng, Qin
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
  • [4] An Efficient ID-Based Ring Signcryption Scheme
    Li, Fagen
    Xiong, Hu
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 542 - 546
  • [5] An ID-based proxy signcryption scheme with fast revocation
    National Key Lab. of ISN, Xidian University, Xi'an 710071, China
    不详
    不详
    Dianzi Yu Xinxi Xuebao, 2008, 3 (672-675):
  • [6] Secure key issuing scheme in ID-based cryptography with revocable ID
    Tanwar, Sarvesh
    Kumar, Anil
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 676 - 685
  • [7] ID-based efficient signcryption key encapsulation scheme
    Lai, Xin
    Huang, Xiaofang
    He, Dake
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (05): : 857 - 863
  • [8] Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    Wang, Hui
    JOURNAL OF COMPUTERS, 2012, 7 (06) : 1345 - 1352
  • [9] A provably secure ID-based mediated signcryption scheme
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +
  • [10] An ID-based efficient signcryption key encapsulation scheme
    Lai, Xin
    Huang, Xiaofang
    He, Dake
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 18 - +