Revocable ID-based signcryption scheme

被引:0
|
作者
Liu, Zhenhua [1 ,2 ,3 ]
Li, Juanjuan [1 ]
Zu, Longhui [1 ]
机构
[1] School of Mathematics and Statistics, Xidian Univ., Xi'an 710126, China
[2] Guangxi Experiment Center of Info. Sci., Guilin Univ. of Electronic Technol., Guilin 541004, China
[3] State Key Lab. of Info. Security, Inst. of Info. Eng., Chinese Academy of Sciences, Beijing 100093, China
关键词
Cryptography;
D O I
暂无
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In order to revoke private key leaks or malicious users in a signcryption system, a new revocable identity-based signcryption scheme was proposed. In this scheme, the master key was randomly divided into two parts, which were used to construct the initial key and generate updated key, respectively. Furthermore, they were used to generate (designcryption) signcryption key randomly, thus the proposed scheme can revoke users and resist key compromise attack. In the standard model, it was shown that the new scheme has IND-CCA2 security under the hardness of DBDH problem and EUF-CMA security under the hardness of CDH problem.
引用
收藏
页码:79 / 86
相关论文
共 50 条
  • [11] An ID-based signcryption scheme for multiple receivers in standard model
    Qi Z.
    Yang G.
    Ren X.
    Wang H.
    Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University (Natural Science Edition), 2011, 32 (05): : 573 - 577
  • [12] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [13] An Id-Based Server-Aided Designcryption Signcryption Scheme
    Lan, Caihui
    Li, Haifeng
    Wang, Caifen
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 95 - 99
  • [15] An efficient multi-PKG ID-based signcryption scheme
    Xu, Q.-L. (xql@sdu.edu.cn), 2012, Science Press (35):
  • [16] ID-based signcryption scheme using extended chaotic maps
    Wang Caifen
    Kang Burong
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 776 - 779
  • [17] An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model
    Zhang, Bo
    SECURITY TECHNOLOGY, 2011, 259 : 123 - 127
  • [18] Anonymous multi-receiver ID-based signcryption scheme
    Pang, Liaojun
    Gao, Lu
    Li, Huixian
    Wang, Yumin
    IET INFORMATION SECURITY, 2015, 9 (03) : 194 - 201
  • [19] An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
    Enos, Graham
    Zheng, Yuliang
    INFORMATION PROCESSING LETTERS, 2015, 115 (02) : 128 - 133
  • [20] An ID-based hybrid broadcast signcryption scheme with user anonymity
    Lin, Z.-Q., 2013, Sichuan University (45):