An Efficient Identity-Based Signcryption Scheme for Multiple Receivers

被引:0
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Srinivasan, Rahul [2 ]
Rangan, Chandrasekaran Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Bombay, Maharashtra, India
来源
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS | 2009年 / 5824卷
关键词
Multiple Receivers; Signcryption; Identity-Based Cryptography; Provable Security; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper puts forward a new efficient, construction for Multi-Receiver Signcrypton in the Identify-based setting. We consider a scenario where a user wants to securely send a message to a dynamically changing subset of the receivers in such a way that, non-members of this subset cannot learn the message One obvious solution is to signcrypt the message to each member of the subset and transmit it to each of them m-individually This requires a very long transmission (the number of receivers times the length of the message) and high computation cost. Another simple solution is to provide it key for every possible subset of receivers This requires every user to store a huge number of keys In this case,the storage efficiency is compromised. The goal of this paper is to provide a solution which is efficient, in all three measures i.e. transmission length, storage of keys and computation at both ends. We propose a new scheme that achieves both confidentiality and anthenticity simultaneously in this setting and is the most efficient scheme to date, in the parameters described above. It breaks the barrier of eiphertext length of linear order in the number of receivers and achieves constant sized eiphertext, independent of the size of the receiver
引用
收藏
页码:71 / +
页数:4
相关论文
共 50 条
  • [21] Efficient Identity-Based Signcryption in the Standard Model
    Li, Fagen
    Bin Muhaya, Fahad
    Zhang, Mingwu
    Takagi, Tsuyoshi
    PROVABLE SECURITY, 2011, 6980 : 120 - +
  • [22] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 547 - 553
  • [23] Analysis of an Identity-Based Signcryption Scheme in the Standard Model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 268 - 269
  • [24] An identity-based threshold signcryption scheme with semantic security
    Peng, CG
    Li, X
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 173 - 179
  • [25] A Novel Identity-Based Multi-Signcryption Scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 28 - 28
  • [26] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Mao, Jian
    COMPUTER COMMUNICATIONS, 2009, 32 (01) : 14 - 18
  • [27] Identity-based key-insulated signcryption scheme
    Wang, Huige
    Cao, Hao
    Li, Desheng
    Journal of Computational Information Systems, 2013, 9 (08): : 3067 - 3075
  • [28] An identity-based ring signcryption scheme in ideal lattice
    Sun, Yiru
    Zheng, Weimin
    Journal of Network Intelligence, 2018, 3 (03): : 152 - 161
  • [29] Identity-based Group-recevier Signcryption scheme
    Zhang, Bo
    Shan, Shan
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1986 - +
  • [30] A Fuzzy Identity-Based Signcryption Scheme from Lattices
    Lu, Xiuhua
    Wen, Qiaoyan
    Li, Wenmin
    Wang, Licheng
    Zhang, Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4203 - 4225