A provably secure ID-based mediated signcryption scheme

被引:2
|
作者
Yu, Yong [1 ]
Yang, Bo [2 ]
Sun, Ying [2 ]
机构
[1] Xidian Univ, Natl Key Lab ISN, Xian 710071, Peoples R China
[2] South China Agr Univ, Coll Informat, Guangzhou, Guangdong 510642, Peoples R China
基金
中国国家自然科学基金;
关键词
sigcryption; mediated signcryption; provably secure; bilinear pairing;
D O I
10.1109/SNPD.2007.231
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It has been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)-based cryptosystems. Unfortunately, none of the previous ID-based cryptography can find a practical way. Motivated by Boneh et al.'s idea of mediated RSA, in this paper we propose the concept of ID-based mediated signcryption and give a concrete scheme, which yields a complete solution to the fast revocation of a user's identity in ID-based signcryption schemes. To address the security issues, we formulate security model and define strong security notions for ID-based mediated signcryption schemes. We also prove that our scheme satisfies these security requirements in the random oracle model.
引用
收藏
页码:647 / +
页数:2
相关论文
共 50 条
  • [1] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [2] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [3] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [4] Provably secure and ID-based group signature scheme
    Chen, ZW
    Huang, JW
    Huang, DR
    Zhang, JH
    Wang, YM
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 384 - 388
  • [5] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [6] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [7] An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model
    Zhang, Bo
    SECURITY TECHNOLOGY, 2011, 259 : 123 - 127
  • [8] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [9] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [10] Revocable ID-based signcryption scheme
    Liu, Zhenhua
    Li, Juanjuan
    Zu, Longhui
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86