Revocable ID-based signcryption scheme

被引:0
|
作者
Liu, Zhenhua [1 ,2 ,3 ]
Li, Juanjuan [1 ]
Zu, Longhui [1 ]
机构
[1] School of Mathematics and Statistics, Xidian Univ., Xi'an 710126, China
[2] Guangxi Experiment Center of Info. Sci., Guilin Univ. of Electronic Technol., Guilin 541004, China
[3] State Key Lab. of Info. Security, Inst. of Info. Eng., Chinese Academy of Sciences, Beijing 100093, China
关键词
Cryptography;
D O I
暂无
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In order to revoke private key leaks or malicious users in a signcryption system, a new revocable identity-based signcryption scheme was proposed. In this scheme, the master key was randomly divided into two parts, which were used to construct the initial key and generate updated key, respectively. Furthermore, they were used to generate (designcryption) signcryption key randomly, thus the proposed scheme can revoke users and resist key compromise attack. In the standard model, it was shown that the new scheme has IND-CCA2 security under the hardness of DBDH problem and EUF-CMA security under the hardness of CDH problem.
引用
收藏
页码:79 / 86
相关论文
共 50 条
  • [21] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [22] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [23] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [24] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215):
  • [25] LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
    Li, Zhimin
    Xu, Xin
    Fan, Zexiang
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2012, 5 (04) : 799 - 810
  • [26] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
    Zhang, Bo
    Xu, Qiuliang
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
  • [27] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications
    Li, Fagen
    Xiong, Hu
    Nie, Xuyun
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300
  • [28] An Improved ID-Based Multi-Proxy Multi-Signcryption Scheme
    Zhou Xiaoyan
    Wu Yan
    Du Weifeng
    Gao Yan
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 466 - +
  • [29] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [30] ID-based Signcryption KEM to Multiple Recipients
    Sun Yinxia
    Li Hui
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 317 - 322