Efficient identity-based broadcast signcryption schemes

被引:18
|
作者
Kim, Intae [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Hongik Univ, Dept Comp & Informat Commun Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
cryptography; identity-based encryption; broadcast encryption; identity-based broadcast encryption; identity-based broadcast signcryption; CONSTANT-SIZE CIPHERTEXTS; MULTIPLE RECEIVERS; SIGNATURE SCHEMES; RANDOM ORACLES; PRIVATE KEYS; ENCRYPTION; SECURE;
D O I
10.1002/sec.802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of broadcast encryption schemes do not provide source authentication property. This allows an adversary to launch impersonating attacks. Therefore, broadcast encryption scheme without source authentication is not applicable in our real life as it is. In this paper, we propose two source-authenticated broadcast encryption schemes that achieve both confidentiality and authenticity simultaneously. Ciphertexts in both schemes are of constant size, independent of the size of the receiver set. The first scheme is particularly efficient in case of pre-computation, whereas the overall performance of the second scheme is better than that of Selvi et al.'s scheme. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:914 / 925
页数:12
相关论文
共 50 条
  • [1] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [2] Identity-based proxy signcryption schemes
    Jian, Wu
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [3] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [4] A computational review of identity-based signcryption schemes
    Mandal, Murari
    Sharma, Gaurav
    Verma, Anil K.
    International Journal of Network Security, 2016, 18 (05) : 969 - 977
  • [5] Fully anonymous identity-based broadcast signcryption with public verification
    Liu, Zhaoman
    Chen, Yanbo
    Ning, Jianting
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2024, 992
  • [7] An Efficient Identity-based Signcryption from Lattice
    Zhao, Xiufeng
    Wang, Xiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 363 - 374
  • [8] Efficient Identity-Based Signcryption in the Standard Model
    Li, Fagen
    Bin Muhaya, Fahad
    Zhang, Mingwu
    Takagi, Tsuyoshi
    PROVABLE SECURITY, 2011, 6980 : 120 - +
  • [9] Identity-Based Broadcast Signcryption Scheme for Vehicular Platoon Communication
    Zhao, Yanan
    Wang, Yunpeng
    Liang, Yuhao
    Yu, Haiyang
    Ren, Yilong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (06) : 7814 - 7824
  • [10] An efficient identity-based proxy signcryption using lattice
    Zhu, Hongfei
    Wang, Ye
    Wang, Chonghua
    Cheng, Xiaochun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 117 : 321 - 327