Revocable ID-based signcryption scheme

被引:0
|
作者
Liu, Zhenhua [1 ,2 ,3 ]
Li, Juanjuan [1 ]
Zu, Longhui [1 ]
机构
[1] School of Mathematics and Statistics, Xidian Univ., Xi'an 710126, China
[2] Guangxi Experiment Center of Info. Sci., Guilin Univ. of Electronic Technol., Guilin 541004, China
[3] State Key Lab. of Info. Security, Inst. of Info. Eng., Chinese Academy of Sciences, Beijing 100093, China
关键词
Cryptography;
D O I
暂无
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In order to revoke private key leaks or malicious users in a signcryption system, a new revocable identity-based signcryption scheme was proposed. In this scheme, the master key was randomly divided into two parts, which were used to construct the initial key and generate updated key, respectively. Furthermore, they were used to generate (designcryption) signcryption key randomly, thus the proposed scheme can revoke users and resist key compromise attack. In the standard model, it was shown that the new scheme has IND-CCA2 security under the hardness of DBDH problem and EUF-CMA security under the hardness of CDH problem.
引用
收藏
页码:79 / 86
相关论文
共 50 条
  • [31] Efficient Revocable ID-Based Encryption with a Public Channel
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    COMPUTER JOURNAL, 2012, 55 (04): : 475 - 486
  • [32] Key-Evolving Hierarchical ID-Based Signcryption
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Hui
    COMPUTER JOURNAL, 2013, 56 (10): : 1228 - 1248
  • [33] Analysis and Improvement of an ID-Based Anonymous Signcryption Model
    Zhang, Mingwu
    Zhong, Yusheng
    Yang, Bo
    Zhang, Wenzheng
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 433 - +
  • [34] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [35] A Fully Secure Revocable ID-Based Encryption in the Standard Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATICA, 2012, 23 (03) : 487 - 505
  • [36] Provably secure revocable ID-based signature in the standard model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1250 - 1260
  • [37] A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"
    Seo, Jae Hong
    Emura, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2282 - 2285
  • [38] Efficient revocable ID-based encryption with cloud revocation server
    Jia, Xiaoying
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [39] Efficient Revocable Multi-Receiver ID-Based Encryption
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 159 - 169
  • [40] Revocable ID-Based Signature with Short Size over Lattices
    Hung, Ying-Hao
    Tseng, Yuh-Min
    Huang, Sen-Shan
    SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 9