Signcryption schemes with anonymity

被引:1
|
作者
Wei B. [1 ,2 ]
Ou H. [1 ,2 ]
Tian H. [1 ,2 ]
Gao C. [3 ]
机构
[1] School of Information Science and Technology, Sun Yat-sen University
[2] Guangdong Key Laboratory of Information Security Technology
[3] School of Computer Science and Educational Software, Guangzhou University
关键词
Adaptive chosen ciphertext attack; Anonymity; Attribute-based; Signcryption schemes;
D O I
10.4156/ijact.vol3.issue8.15
中图分类号
学科分类号
摘要
Signcryption schemes were invented to achieve confidentiality and authentication effectively at one logic step. To provide anonymity for both communication parties, an Attribute-Based signcryption scheme is presented in this paper. The confidentiality, unforgeability and anonymity are proved under the random oracle model. Moreover, two more efficient Attribute-Based signcryption schemes are also proposed.
引用
收藏
页码:127 / 137
页数:10
相关论文
共 50 条
  • [21] Attribute-based key-insulated signcryption with bidirectional anonymity
    Zhang, Xing-Lan
    Zhang, Zhen
    Tongxin Xuebao/Journal on Communications, 2013, 34 (11): : 42 - 50
  • [23] Identity-based proxy signcryption schemes
    Jian, Wu
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [24] An ID-based hybrid broadcast signcryption scheme with user anonymity
    Lin, Z.-Q., 2013, Sichuan University (45):
  • [25] Schemes for encryption with anonymity and ring signature
    Hayashi, R
    Tanaka, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 66 - 73
  • [26] Schemes for encryption with anonymity and ring signature
    Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, 152-8552, Japan
    不详
    IEICE Trans Commun, 2006, 1 (66-73):
  • [27] Schemes for encryption with anonymity and ring signature
    Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, 152-8552, Japan
    不详
    IEICE Trans Fund Electron Commun Comput Sci, 2006, 1 (66-73):
  • [28] A Strong Designated Verifier Ring Signcryption Scheme Providing Strongest Signers' Anonymity
    Hwang, Shin-Jia
    Chen, Jyong-Ye
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (03) : 895 - 910
  • [29] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698