An Efficient Identity-Based Signcryption Scheme for Multiple Receivers

被引:0
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Srinivasan, Rahul [2 ]
Rangan, Chandrasekaran Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Bombay, Maharashtra, India
关键词
Multiple Receivers; Signcryption; Identity-Based Cryptography; Provable Security; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper puts forward a new efficient, construction for Multi-Receiver Signcrypton in the Identify-based setting. We consider a scenario where a user wants to securely send a message to a dynamically changing subset of the receivers in such a way that, non-members of this subset cannot learn the message One obvious solution is to signcrypt the message to each member of the subset and transmit it to each of them m-individually This requires a very long transmission (the number of receivers times the length of the message) and high computation cost. Another simple solution is to provide it key for every possible subset of receivers This requires every user to store a huge number of keys In this case,the storage efficiency is compromised. The goal of this paper is to provide a solution which is efficient, in all three measures i.e. transmission length, storage of keys and computation at both ends. We propose a new scheme that achieves both confidentiality and anthenticity simultaneously in this setting and is the most efficient scheme to date, in the parameters described above. It breaks the barrier of eiphertext length of linear order in the number of receivers and achieves constant sized eiphertext, independent of the size of the receiver
引用
收藏
页码:71 / +
页数:4
相关论文
共 50 条
  • [1] Efficient identity-based signcryption scheme for multiple receivers
    Yu, Yong
    Yang, Bo
    Huang, Xinyi
    Zhang, Mingwu
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 13 - +
  • [2] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [4] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [5] An Efficient Identity-based Multi-signcryption Scheme
    Qi, Z. H.
    Yang, H. C.
    Huang, H.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
  • [6] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [7] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [8] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310
  • [9] An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings
    Elkamchouchi, Hassan
    Abou El-kheir, Eman
    Abouelseoud, Yasmine
    2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 80 - 85
  • [10] Efficient identity-based multi-recipient signcryption scheme
    Du, Hong-Zhen
    Wen, Qiao-Yan
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2009, 26 (02): : 127 - 131