Analysis and Improvement of an ID-Based Anonymous Signcryption Model

被引:0
|
作者
Zhang, Mingwu [1 ]
Zhong, Yusheng [1 ]
Yang, Bo [1 ]
Zhang, Wenzheng [2 ]
机构
[1] S China Agr Univ, Coll Informat, Dept Comp Sci & Engn, Guangzhou 510642, Guangdong, Peoples R China
[2] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
anonymous signcryption; bilinear pairings; unforgeability; anonymity; IDENTITY-BASED SIGNCRYPTION; SCHEME; EFFICIENT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ring signcryption, a cryptographic primitive to protect security and privacy, is an encryption acid authentication scheme in a single logical step which allows a user to anonymously signcrypt a plaintext on behalf of a group of users that decrypter cannot know who is the actual signcrypter, which can be used to protect nodes or participants privacy in ubiquitous environments such RFID, WSN, Ad hoc etc. In 2009, Zhang, Gao, Chen and Geng proposed a, novel anonymous signcryption scheme(denoted as the ZGCG scheme) which is more efficient in computational cost and ciphertext length than the related schemes. lit this paper, however; we show that the ZGCG scheme has not anonymity secure for the receiver; and then we propose an improved anonymous signcryption scheme that remedies the weakness of the ZGCG scheme. Our proposed scheme satisfies the semantic security, unforgeability, signcrypter identity's ambiguity, and public authenticity. We also give the formal security proof in the random oracle model.
引用
收藏
页码:433 / +
页数:2
相关论文
共 50 条
  • [31] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [32] An improved anonymous ID-based key issuing protocol
    Cai, Yongquan
    Yan, Xiang
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 472 - +
  • [33] Unconditionally Anonymous Controllable ID-Based Ring Signatures
    Thandra, Prasanth Kumar
    Rajan, J.
    Satyamurty, S. A. V.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (06): : 849 - 867
  • [34] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [35] ID-Based Plaintext Checkable Signcryption with Equality Test in Healthcare Systems
    Alornyo S.
    Mohammed M.A.
    Anibrika B.S.
    Asante M.
    SN Computer Science, 2021, 2 (1)
  • [36] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [37] Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption
    Wei, Guiyi
    Shao, Jun
    Xiang, Yang
    Zhu, Pingping
    Lu, Rongxing
    INFORMATION SCIENCES, 2015, 318 : 111 - 122
  • [38] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215):
  • [39] LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
    Li, Zhimin
    Xu, Xin
    Fan, Zexiang
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2012, 5 (04) : 799 - 810
  • [40] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21