Signcryption schemes with anonymity

被引:1
|
作者
Wei B. [1 ,2 ]
Ou H. [1 ,2 ]
Tian H. [1 ,2 ]
Gao C. [3 ]
机构
[1] School of Information Science and Technology, Sun Yat-sen University
[2] Guangdong Key Laboratory of Information Security Technology
[3] School of Computer Science and Educational Software, Guangzhou University
关键词
Adaptive chosen ciphertext attack; Anonymity; Attribute-based; Signcryption schemes;
D O I
10.4156/ijact.vol3.issue8.15
中图分类号
学科分类号
摘要
Signcryption schemes were invented to achieve confidentiality and authentication effectively at one logic step. To provide anonymity for both communication parties, an Attribute-Based signcryption scheme is presented in this paper. The confidentiality, unforgeability and anonymity are proved under the random oracle model. Moreover, two more efficient Attribute-Based signcryption schemes are also proposed.
引用
收藏
页码:127 / 137
页数:10
相关论文
共 50 条
  • [1] Efficient Constructions of Signcryption Schemes and Signcryption Composability
    Matsuda, Takahiro
    Matsuura, Kanta
    Schuldt, Jacob C. N.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 321 - 342
  • [2] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [3] Cryptoanalysis of Two Signcryption Schemes
    Zhang, Jianhong
    Geng, Qin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 65 - 68
  • [4] Construction of Identity Based Signcryption Schemes
    Pandey, Sumit Kumar
    Barua, Rana
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 1 - 14
  • [5] Identity Based Aggregate Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Shriram, J.
    Kalaivani, S.
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 378 - +
  • [6] Breaking and Building of Threshold Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Nayak, Shilpi
    Rangan, C. Pandu
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 108 - +
  • [7] Security flaw of an ECC-based signcryption scheme with anonymity
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, No. 4, North Jianshe Road, Chenghua District, Chengdu, Sichuan, 610054, China
    不详
    不详
    Int. J. Netw. Secur., 2013, 4 (317-320):
  • [8] Analysis and improvement of two signcryption schemes
    Zhang M.-W.
    Yang B.
    Zhou M.
    Zhang W.-Z.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (07): : 1731 - 1736
  • [9] Signcryption schemes with threshold unsigncryption, and applications
    Javier Herranz
    Alexandre Ruiz
    Germán Sáez
    Designs, Codes and Cryptography, 2014, 70 : 323 - 345
  • [10] ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
    Vivek, S. Sree
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 219 - 224