A Novel Identity-Based Multi-Signcryption Scheme

被引:3
|
作者
Zhang, Jianhong [1 ,2 ]
Yang, Yixian [1 ]
Niu, Xinxin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] N China Univ Technol, Coll Sci, Beijing, Peoples R China
基金
北京市自然科学基金;
关键词
D O I
10.1080/15501320802520613
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Message security and the sender's identity authentication for communication in the open channel is a basic and important technology of the internet. For keeping the message confidential and unforgeable, the sender can use a digital signature algorithm with his private key to sign the message, and then encrypts the signature on the message. Signcryption which was proposed by Zheng et. al in 1997 is a novel cryptographic primitive that simultaneously provides the authentication and encryption in a single logic step and at lower computational costs and communication overheads than the above sign-then-encrypt way. Since then, there are many signcryption schemes proposed. Only recently, a formal security proof model is formalized providing security proof for Zheng's signcryption in the random oracle model. In the ID-based cryptography, the complexity of the managing certificate is reduced. In this work, by combining a multisignature with an ID-based signcryption scheme, we build a security model of multi-signcryption to define confidentiality and unforgeability of the ID-based signcryption scheme and have proposed an ID-based multi-signcryption scheme based on the bilinear pairings to adapt to a multi-user setting. Given a message m, a receiver's identity IDB, and n sender's identities IDA1, IDA2, , IDAn, for each sender Ai, it executes the followings steps: randomly pick xi Zq to compute Ri = xiP and i = xiQIDB; send (Ri, i) to the other senders by a secure channel; (3)after receiving the other senders (Ri, i), Ai computes = e(Ppub, j) to set c = H2()m and R = Rj; compute Si = xiH4(m) + H3(R,)SIDAi, where SIDAi is the private key of sender Ai. Then the resulting ciphertext is (c,S,R). To unsigcrypt the ciphertext (c,S,R) in the sender list L = (IDA1, IDA2, , IDAn), the receiver with identity IDB can compute the following steps to recover and verify the message validity. compute = e(R,SIDB) and m = H2()c, where SIDB is private key of the receiver; accept the message if and only if the following equation holds [image omitted] By security analysis, we show that our scheme satisfies the two important properties of signcryption: confidentiality and unforgeability, and is proven to have been secure in the random oracle model. The security of the scheme is closely related to the Decisional Bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption. Finally, by analyzing the efficiency of the scheme, we show that our scheme is very efficient, and only one pairing computation is needed in the signcryption phase, three pairing operators are needed in the unsigncrytion phase, and the ciphertext size is about 420 bits.
引用
收藏
页码:28 / 28
页数:1
相关论文
共 50 条
  • [1] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 547 - 553
  • [2] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Mao, Jian
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (01) : 14 - 18
  • [3] An Efficient Identity-based Multi-signcryption Scheme
    Qi, Z. H.
    Yang, H. C.
    Huang, H.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
  • [4] Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 61 - 75
  • [5] Extended identity based multi-signcryption scheme with public verifiability
    Tanwar, Sarvesh
    Kumar, Anil
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (02): : 503 - 517
  • [6] Efficient Identity Based Multi-Signcryption Scheme with Public Verifiability
    Swapna, G.
    Reddy, P. Vasudeva
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02): : 181 - 190
  • [7] Multi-signcryption scheme using identity and bilinear pairing
    Zhang, Chuan-Rong
    Xiao, Guo-Zhen
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2007, 34 (02): : 270 - 273
  • [8] Identity based Multi-Proxy Multi-Signcryption Scheme for Electronic Commerce
    Sun, Ying
    Xu, Chunxiang
    Li, Fagen
    Yu, Yong
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 281 - 284
  • [9] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310
  • [10] Identity-based multi-receiver threshold signcryption scheme
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1331 - 1337