Skip to main content
Top

2014 | OriginalPaper | Chapter

New Multi-Receiver Id-Based Ring Signcryption Scheme

Authors : Xing Wang, Jian Shu, Wei Zheng, Linlan Liu, Xin Fan

Published in: Unifying Electrical Engineering and Electronics Engineering

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The first multi-receiver id-based ring signcryption (mIBRSC) scheme was proposed by Lal et al., which enables the user to anonymously deliver some important information to multiple receivers in a secure and authenticated manner. In this chapter, we show that their scheme is insecure against adaptive chosen ciphertext attacks. Furthermore, we present an improved mIBRSC scheme, which satisfies both confidentiality and unforgeability in the random oracle model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) Cost (Signature)+Cost(Encryption). CRYPTO 97, LNCS 1294, Springer, pp 165–179 Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) Cost (Signature)+Cost(Encryption). CRYPTO 97, LNCS 1294, Springer, pp 165–179
2.
go back to reference Zheng Y, Imai H (1998) Efficient signcryption schemes on elliptic curves. IFIP/SEC 98, Chapman & Hall Zheng Y, Imai H (1998) Efficient signcryption schemes on elliptic curves. IFIP/SEC 98, Chapman & Hall
3.
go back to reference Steinfeld R, Zheng Y (2000) A signcryption scheme based on integer factorization. ISW 00, pp 308–322 Steinfeld R, Zheng Y (2000) A signcryption scheme based on integer factorization. ISW 00, pp 308–322
4.
go back to reference Yum BH, Lee PJ (2001) New signcryption schemes based on KCDSA. ICISC 01, LNCS 2288, pp 305–317 Yum BH, Lee PJ (2001) New signcryption schemes based on KCDSA. ICISC 01, LNCS 2288, pp 305–317
5.
go back to reference Shamir (1984) Identity-based cryptosystems and signature schemes. CRYPTO 84, LNCS 196, Springer, pp 47–53 Shamir (1984) Identity-based cryptosystems and signature schemes. CRYPTO 84, LNCS 196, Springer, pp 47–53
6.
go back to reference Boneh D, Franklin M (2001) Identity based encryption from the Weil pairing. CRYPTO 01, LNCS 2139, Springer, pp 213–229 Boneh D, Franklin M (2001) Identity based encryption from the Weil pairing. CRYPTO 01, LNCS 2139, Springer, pp 213–229
8.
go back to reference Libert B, Quisquater JJ (2003) A new identity based signcryption schemes from pairings. In 2003 I.E. information theory workshop8. France, Paris, pp 155–158 Libert B, Quisquater JJ (2003) A new identity based signcryption schemes from pairings. In 2003 I.E. information theory workshop8. France, Paris, pp 155–158
9.
go back to reference Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. ICISC 2003, LNCS 2971, Springer, pp 352–369 Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. ICISC 2003, LNCS 2971, Springer, pp 352–369
10.
go back to reference Chen L, Malone-Lee J (2005) Improved identity-based signcryption. PKC 2005, LNCS 3386, Springer, pp 36–379 Chen L, Malone-Lee J (2005) Improved identity-based signcryption. PKC 2005, LNCS 3386, Springer, pp 36–379
11.
go back to reference Barreto PSLM, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity based signatures and signcryption from bilinear maps. ASIACRYPT 2005, LNCS 3788, Springer, pp 515–532 Barreto PSLM, Libert B, McCullagh N, Quisquater JJ (2005) Efficient and provably-secure identity based signatures and signcryption from bilinear maps. ASIACRYPT 2005, LNCS 3788, Springer, pp 515–532
12.
go back to reference Boyen X (2003) Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. CRYPTO 2003, LNCS 2729, Springer, pp 383–399 Boyen X (2003) Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. CRYPTO 2003, LNCS 2729, Springer, pp 383–399
14.
go back to reference Bellare M, Boldyreva A, Micali S (2000) Public-key encryption in a multi-user setting: security proofs and improvements. EUROCRYPT 2000, LNCS 1807, Springer, pp 259–274 Bellare M, Boldyreva A, Micali S (2000) Public-key encryption in a multi-user setting: security proofs and improvements. EUROCRYPT 2000, LNCS 1807, Springer, pp 259–274
15.
go back to reference Duan S, Cao Z (2006) Efficient and provably secure multi receiver identity based signcryption. ACISP 2006, LNCS 4058, Springer, pp 195–206 Duan S, Cao Z (2006) Efficient and provably secure multi receiver identity based signcryption. ACISP 2006, LNCS 4058, Springer, pp 195–206
16.
go back to reference Tan CH (2008) On the security of provably secure multi-receiver ID-based signcryption scheme. IEICE Trans Fundam Electron Commun Comput Sci E91-A(7):1836–1838 Tan CH (2008) On the security of provably secure multi-receiver ID-based signcryption scheme. IEICE Trans Fundam Electron Commun Comput Sci E91-A(7):1836–1838
17.
go back to reference Rivest R, Shamir A, Tauman Y (2001) How to leak a secret. Asiacrypt 01, LNCS 2248, Springer, pp 552–565 Rivest R, Shamir A, Tauman Y (2001) How to leak a secret. Asiacrypt 01, LNCS 2248, Springer, pp 552–565
18.
go back to reference Huang X, Susilo W, Mu Y, Zhang F (2005) Identity based ring signcryption scheme: cryptographic primitive for preserving privacy and authenticity in the ubiquitous world. AINA 05, vol 2, pp 649–654 Huang X, Susilo W, Mu Y, Zhang F (2005) Identity based ring signcryption scheme: cryptographic primitive for preserving privacy and authenticity in the ubiquitous world. AINA 05, vol 2, pp 649–654
23.
go back to reference Herranz J, Saez G (2004) New identity-based ring signature schemes. ICICS 04, LNCS 3269, Springer, pp 27–39 Herranz J, Saez G (2004) New identity-based ring signature schemes. ICICS 04, LNCS 3269, Springer, pp 27–39
Metadata
Title
New Multi-Receiver Id-Based Ring Signcryption Scheme
Authors
Xing Wang
Jian Shu
Wei Zheng
Linlan Liu
Xin Fan
Copyright Year
2014
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-4981-2_246