An ID-based signcryption scheme with compartmented secret sharing for unsigncryption

被引:8
|
作者
Enos, Graham [1 ]
Zheng, Yuliang [2 ]
机构
[1] Univ N Carolina, Dept Math & Stat, Charlotte, NC 28223 USA
[2] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
关键词
Cryptography; Digital signature; Signcryption; Bilinear maps; Compartmented secret sharing; EFFICIENT;
D O I
10.1016/j.ipl.2014.08.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the ID-based signcryption scheme of Li, Xin, and Hu is extended to a compartmented scheme. If an organization is partitioned into different compartments, this scheme allows any member of a specific compartment to participate in the unsigncryption; moreover, each member of a compartment has information unique to that individual. This construction is the first (to the authors' knowledge) to combine identity-based encryption, Shamir's threshold scheme, and signcryption into an implementable compartmented sharing scheme. Published by Elsevier B.V.
引用
收藏
页码:128 / 133
页数:6
相关论文
共 50 条
  • [41] A digital signature scheme on ID-based key-sharing infrastructures
    Nishioka, T
    Hanaoka, G
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01) : 214 - 221
  • [42] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [43] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing
    Peng, CG
    Li, X
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
  • [44] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [45] Privacy Preservation and Drone Authentication Using ID-Based Signcryption
    Benzarti, Sana
    Triki, Bayrem
    Korbaa, Ouajdi
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18), 2018, 303 : 226 - 239
  • [46] On the forward secrecy of Chikazawa-Yamagishi ID-based key sharing scheme
    Jung, BE
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (02) : 114 - 115
  • [47] A new probabilistic ID-based non-interactive key sharing scheme
    Murakami, Y
    Sakai, R
    Kasahara, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01) : 2 - 9
  • [48] A new digital signature scheme on ID-based key-sharing infrastructures
    Nishioka, T
    Hanaoka, G
    Imai, H
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 259 - 270
  • [49] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [50] ID-based digital multisignature scheme
    Dept. of Comp. Sci. and Engineering, South China University of Technology, Guangzhou, Guangdong Province 510640, China
    不详
    J. Circuits Syst. Comput., 3-4 (223-227):