Analysis and Improvement of an ID-Based Anonymous Signcryption Model

被引:0
|
作者
Zhang, Mingwu [1 ]
Zhong, Yusheng [1 ]
Yang, Bo [1 ]
Zhang, Wenzheng [2 ]
机构
[1] S China Agr Univ, Coll Informat, Dept Comp Sci & Engn, Guangzhou 510642, Guangdong, Peoples R China
[2] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
anonymous signcryption; bilinear pairings; unforgeability; anonymity; IDENTITY-BASED SIGNCRYPTION; SCHEME; EFFICIENT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ring signcryption, a cryptographic primitive to protect security and privacy, is an encryption acid authentication scheme in a single logical step which allows a user to anonymously signcrypt a plaintext on behalf of a group of users that decrypter cannot know who is the actual signcrypter, which can be used to protect nodes or participants privacy in ubiquitous environments such RFID, WSN, Ad hoc etc. In 2009, Zhang, Gao, Chen and Geng proposed a, novel anonymous signcryption scheme(denoted as the ZGCG scheme) which is more efficient in computational cost and ciphertext length than the related schemes. lit this paper, however; we show that the ZGCG scheme has not anonymity secure for the receiver; and then we propose an improved anonymous signcryption scheme that remedies the weakness of the ZGCG scheme. Our proposed scheme satisfies the semantic security, unforgeability, signcrypter identity's ambiguity, and public authenticity. We also give the formal security proof in the random oracle model.
引用
收藏
页码:433 / +
页数:2
相关论文
共 50 条
  • [41] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [42] An Enhanced ID-Based Anonymous Proxy Signature Scheme on Pairings
    Hu, Chengyu
    Liu, Pengtao
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 343 - 346
  • [43] Anonymous ID-based group key agreement for wireless networks
    Wan, Zhiguo
    Ren, Kui
    Lou, Wenjing
    Preneel, Bart
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2615 - +
  • [44] Improvement of an efficient ID-based RSA multisignature
    Yang, Fuw-Yi
    Lo, Jeng-Hung
    Liao, Cai-Ming
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 822 - 826
  • [46] Improvement of an ID-based deniable authentication protocol
    Lin T.-C.
    Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16): : 139 - 144
  • [47] Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
    Li, Fagen
    Shirase, Masaaki
    Takag, Tsuyoshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 289 - +
  • [48] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    JournalofElectronicScienceandTechnology, 2018, 16 (02) : 139 - 144
  • [49] ID-based key-insulated signcryption with equality test in cloud computing
    Alornyo, Seth
    Mireku, Kingsford Kissi
    Mohammed, Mustapha Adamu
    Adu-Gyamfi, Daniel
    Asante, Michael
    SN APPLIED SCIENCES, 2021, 3 (04):
  • [50] ID-based key-insulated signcryption with equality test in cloud computing
    Seth Alornyo
    Kingsford Kissi Mireku
    Mustapha Adamu Mohammed
    Daniel Adu-Gyamfi
    Michael Asante
    SN Applied Sciences, 2021, 3