A provably secure ID-based mediated signcryption scheme

被引:2
|
作者
Yu, Yong [1 ]
Yang, Bo [2 ]
Sun, Ying [2 ]
机构
[1] Xidian Univ, Natl Key Lab ISN, Xian 710071, Peoples R China
[2] South China Agr Univ, Coll Informat, Guangzhou, Guangdong 510642, Peoples R China
基金
中国国家自然科学基金;
关键词
sigcryption; mediated signcryption; provably secure; bilinear pairing;
D O I
10.1109/SNPD.2007.231
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It has been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)-based cryptosystems. Unfortunately, none of the previous ID-based cryptography can find a practical way. Motivated by Boneh et al.'s idea of mediated RSA, in this paper we propose the concept of ID-based mediated signcryption and give a concrete scheme, which yields a complete solution to the fast revocation of a user's identity in ID-based signcryption schemes. To address the security issues, we formulate security model and define strong security notions for ID-based mediated signcryption schemes. We also prove that our scheme satisfies these security requirements in the random oracle model.
引用
收藏
页码:647 / +
页数:2
相关论文
共 50 条
  • [1] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [2] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [3] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [4] Provably secure and ID-based group signature scheme
    Chen, ZW
    Huang, JW
    Huang, DR
    Zhang, JH
    Wang, YM
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 384 - 388
  • [5] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [6] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    [J]. PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [7] An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model
    Zhang, Bo
    [J]. SECURITY TECHNOLOGY, 2011, 259 : 123 - 127
  • [8] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [9] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [10] AN EFFICIENT AND PROVABLY SECURE ID-BASED SIGNATURE SCHEME WITH BATCH VERIFICATIONS
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3911 - 3922