Efficient and provably secure multi-receiver identity-based signcryption

被引:0
|
作者
Duan, Shanshan [1 ]
Cao, Zhenfu [1 ]
机构
[1] Shanghai Jiao Tong Univ, TDT Lab, Shanghai 200240, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can provide confidentiality and authenticity simultaneously in the multi-receiver setting. We compare our scheme with several multi-receiver constructions from the security and efficiency points of view and argue that our provably secure scheme is more efficient than other known constructions. To address the security issues, we formulate security models and define strong security notions for multi-receiver identity based signcryption schemes. We also prove that our scheme satisfies these strong security requirements in the random oracle model.
引用
收藏
页码:195 / 206
页数:12
相关论文
共 50 条
  • [1] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme
    Zhou, Caixue
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88
  • [2] A provably secure multi-receiver identity-based signcryption using bilinear maps
    Narayan, Shivaramakrishnan
    Udaya, Parampalli
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 305 - 308
  • [3] Efficient and Provably Secure Certificateless Multi-receiver Signcryption
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Shukla, Deepanshu
    Chandrasekaran, Pandu Rangan
    PROVABLE SECURITY, 2008, 5324 : 52 - +
  • [4] Efficient multi-receiver identity-based signcryption from lattice assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    Xue, Jingting
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 20 - 38
  • [5] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [6] Provably Secure Anonymous Multi-Receiver Identity-Based Encryption with Shorter Ciphertext
    Wang, Huaqun
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 85 - 90
  • [7] Identity-based multi-receiver threshold signcryption scheme
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1331 - 1337
  • [8] Multi-receiver Identity-Based Signcryption Scheme in the Standard Model
    Ming, Yang
    Zhao, Xiangmo
    Wang, Yumin
    INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 487 - +
  • [9] MIDSCYK: An Efficient Provably Secure Multi-Recipient Identity-Based Signcryption Scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    ICNM: 2009 INTERNATIONAL CONFERENCE ON NETWORKING & MEDIA CONVERGENCE, 2007, : 70 - 75
  • [10] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838