An ID-based signcryption scheme with compartmented secret sharing for unsigncryption

被引:8
|
作者
Enos, Graham [1 ]
Zheng, Yuliang [2 ]
机构
[1] Univ N Carolina, Dept Math & Stat, Charlotte, NC 28223 USA
[2] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
关键词
Cryptography; Digital signature; Signcryption; Bilinear maps; Compartmented secret sharing; EFFICIENT;
D O I
10.1016/j.ipl.2014.08.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the ID-based signcryption scheme of Li, Xin, and Hu is extended to a compartmented scheme. If an organization is partitioned into different compartments, this scheme allows any member of a specific compartment to participate in the unsigncryption; moreover, each member of a compartment has information unique to that individual. This construction is the first (to the authors' knowledge) to combine identity-based encryption, Shamir's threshold scheme, and signcryption into an implementable compartmented sharing scheme. Published by Elsevier B.V.
引用
收藏
页码:128 / 133
页数:6
相关论文
共 50 条
  • [31] An Improved ID-Based Multi-Proxy Multi-Signcryption Scheme
    Zhou Xiaoyan
    Wu Yan
    Du Weifeng
    Gao Yan
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 466 - +
  • [32] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [33] An ID-based Block Ring Signature System for Secret Sharing of Data
    Patil, Kavita
    Wasnik, Chitra T.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [34] ID-based Signcryption KEM to Multiple Recipients
    Sun Yinxia
    Li Hui
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 317 - 322
  • [35] A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
    Yu, Yuyin
    Wang, Mingsheng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 136 - 142
  • [36] Threshold Secret Sharing Scheme for Compartmented Access Structures
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (03) : 1 - 9
  • [37] An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
    Xu, Guoai
    Yuan, Jiangtao
    Xu, Guosheng
    Dang, Zhongkai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] Key-Evolving Hierarchical ID-Based Signcryption
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Hui
    COMPUTER JOURNAL, 2013, 56 (10): : 1228 - 1248
  • [39] Analysis and Improvement of an ID-Based Anonymous Signcryption Model
    Zhang, Mingwu
    Zhong, Yusheng
    Yang, Bo
    Zhang, Wenzheng
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 433 - +
  • [40] Certificateless threshold signcryption scheme with secret sharing mechanism
    Yu, Huifang
    Wang, Shengbing
    KNOWLEDGE-BASED SYSTEMS, 2021, 221