An ID-based signcryption scheme with compartmented secret sharing for unsigncryption

被引:8
|
作者
Enos, Graham [1 ]
Zheng, Yuliang [2 ]
机构
[1] Univ N Carolina, Dept Math & Stat, Charlotte, NC 28223 USA
[2] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
关键词
Cryptography; Digital signature; Signcryption; Bilinear maps; Compartmented secret sharing; EFFICIENT;
D O I
10.1016/j.ipl.2014.08.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the ID-based signcryption scheme of Li, Xin, and Hu is extended to a compartmented scheme. If an organization is partitioned into different compartments, this scheme allows any member of a specific compartment to participate in the unsigncryption; moreover, each member of a compartment has information unique to that individual. This construction is the first (to the authors' knowledge) to combine identity-based encryption, Shamir's threshold scheme, and signcryption into an implementable compartmented sharing scheme. Published by Elsevier B.V.
引用
收藏
页码:128 / 133
页数:6
相关论文
共 50 条
  • [21] An ID-based hybrid broadcast signcryption scheme with user anonymity
    Lin, Z.-Q., 2013, Sichuan University (45):
  • [22] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [23] A SIMPLE ID-BASED SCHEME FOR KEY SHARING
    TSUJII, S
    CHAO, JH
    ARAKI, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 730 - 734
  • [24] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [25] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [26] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215):
  • [27] LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
    Li, Zhimin
    Xu, Xin
    Fan, Zexiang
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2012, 5 (04) : 799 - 810
  • [28] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
    Zhang, Bo
    Xu, Qiuliang
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
  • [29] Efficient electronic auction scheme based on secret sharing and signcryption
    Zhang, Futai
    Zhang, Fangguo
    Wang, Yumin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2001, 23 (12):
  • [30] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications
    Li, Fagen
    Xiong, Hu
    Nie, Xuyun
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300