Revocable ID-based signcryption scheme

被引:0
|
作者
Liu, Zhenhua [1 ,2 ,3 ]
Li, Juanjuan [1 ]
Zu, Longhui [1 ]
机构
[1] School of Mathematics and Statistics, Xidian Univ., Xi'an 710126, China
[2] Guangxi Experiment Center of Info. Sci., Guilin Univ. of Electronic Technol., Guilin 541004, China
[3] State Key Lab. of Info. Security, Inst. of Info. Eng., Chinese Academy of Sciences, Beijing 100093, China
关键词
Cryptography;
D O I
暂无
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In order to revoke private key leaks or malicious users in a signcryption system, a new revocable identity-based signcryption scheme was proposed. In this scheme, the master key was randomly divided into two parts, which were used to construct the initial key and generate updated key, respectively. Furthermore, they were used to generate (designcryption) signcryption key randomly, thus the proposed scheme can revoke users and resist key compromise attack. In the standard model, it was shown that the new scheme has IND-CCA2 security under the hardness of DBDH problem and EUF-CMA security under the hardness of CDH problem.
引用
收藏
页码:79 / 86
相关论文
共 50 条
  • [41] Efficient Revocable ID-Based Signature With Cloud Revocation Server
    Jia, Xiaoying
    He, Debiao
    Zeadally, Sherali
    Li, Li
    IEEE ACCESS, 2017, 5 : 2945 - 2954
  • [42] Unlinkable and Revocable Signcryption Scheme for VANETs
    Li, Lihui
    Chen, Dongmei
    Liu, Yining
    Liang, Yangfan
    Wang, Yujue
    Wu, Xianglin
    ELECTRONICS, 2024, 13 (16)
  • [43] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [44] Privacy Preservation and Drone Authentication Using ID-Based Signcryption
    Benzarti, Sana
    Triki, Bayrem
    Korbaa, Ouajdi
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18), 2018, 303 : 226 - 239
  • [45] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [46] ID-based digital multisignature scheme
    Dept. of Comp. Sci. and Engineering, South China University of Technology, Guangzhou, Guangdong Province 510640, China
    不详
    J. Circuits Syst. Comput., 3-4 (223-227):
  • [47] ID-based Encryption Scheme with Revocation
    Othman, Hafizul Azrie
    Ismail, Eddie Shahril
    4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [48] New ID-based identification scheme
    Li, Yan-Ping
    Su, Wan-Li
    Wang, Yu-Min
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (01): : 86 - 90
  • [49] ID-based digital multisignature scheme
    Tang, SH
    Wei, G
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 1999, 9 (3-4) : 223 - 227
  • [50] Strongly Secure Revocable ID-based Signature without Random Oracles
    Hung, Ying-Hao
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 264 - 276