Analysis and Improvement of an ID-Based Anonymous Signcryption Model

被引:0
|
作者
Zhang, Mingwu [1 ]
Zhong, Yusheng [1 ]
Yang, Bo [1 ]
Zhang, Wenzheng [2 ]
机构
[1] S China Agr Univ, Coll Informat, Dept Comp Sci & Engn, Guangzhou 510642, Guangdong, Peoples R China
[2] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
anonymous signcryption; bilinear pairings; unforgeability; anonymity; IDENTITY-BASED SIGNCRYPTION; SCHEME; EFFICIENT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ring signcryption, a cryptographic primitive to protect security and privacy, is an encryption acid authentication scheme in a single logical step which allows a user to anonymously signcrypt a plaintext on behalf of a group of users that decrypter cannot know who is the actual signcrypter, which can be used to protect nodes or participants privacy in ubiquitous environments such RFID, WSN, Ad hoc etc. In 2009, Zhang, Gao, Chen and Geng proposed a, novel anonymous signcryption scheme(denoted as the ZGCG scheme) which is more efficient in computational cost and ciphertext length than the related schemes. lit this paper, however; we show that the ZGCG scheme has not anonymity secure for the receiver; and then we propose an improved anonymous signcryption scheme that remedies the weakness of the ZGCG scheme. Our proposed scheme satisfies the semantic security, unforgeability, signcrypter identity's ambiguity, and public authenticity. We also give the formal security proof in the random oracle model.
引用
收藏
页码:433 / +
页数:2
相关论文
共 50 条
  • [21] An ID-based Anonymous-message Anonymous Signature Scheme
    Zhang, Jianhong
    Yang, Yixian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 462 - +
  • [22] An Id-Based Server-Aided Designcryption Signcryption Scheme
    Lan, Caihui
    Li, Haifeng
    Wang, Caifen
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 95 - 99
  • [24] An efficient multi-PKG ID-based signcryption scheme
    Xu, Q.-L. (xql@sdu.edu.cn), 2012, Science Press (35):
  • [25] ID-based signcryption scheme using extended chaotic maps
    Wang Caifen
    Kang Burong
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 776 - 779
  • [26] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [27] Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model
    Zhang, Mingwu
    Li, Pengcheng
    Yang, Bo
    Wang, Hao
    Takagi, Tsuyoshi
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2010, 6122 : 98 - +
  • [28] Privacy Preservation and Drone Authentication Using ID-Based Signcryption
    Benzarti, Sana
    Triki, Bayrem
    Korbaa, Ouajdi
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18), 2018, 303 : 226 - 239
  • [29] An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
    Enos, Graham
    Zheng, Yuliang
    INFORMATION PROCESSING LETTERS, 2015, 115 (02) : 128 - 133
  • [30] An ID-based hybrid broadcast signcryption scheme with user anonymity
    Lin, Z.-Q., 2013, Sichuan University (45):