Efficient identity-based broadcast signcryption schemes

被引:18
|
作者
Kim, Intae [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Hongik Univ, Dept Comp & Informat Commun Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
cryptography; identity-based encryption; broadcast encryption; identity-based broadcast encryption; identity-based broadcast signcryption; CONSTANT-SIZE CIPHERTEXTS; MULTIPLE RECEIVERS; SIGNATURE SCHEMES; RANDOM ORACLES; PRIVATE KEYS; ENCRYPTION; SECURE;
D O I
10.1002/sec.802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of broadcast encryption schemes do not provide source authentication property. This allows an adversary to launch impersonating attacks. Therefore, broadcast encryption scheme without source authentication is not applicable in our real life as it is. In this paper, we propose two source-authenticated broadcast encryption schemes that achieve both confidentiality and authenticity simultaneously. Ciphertexts in both schemes are of constant size, independent of the size of the receiver set. The first scheme is particularly efficient in case of pre-computation, whereas the overall performance of the second scheme is better than that of Selvi et al.'s scheme. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:914 / 925
页数:12
相关论文
共 50 条
  • [11] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [12] Efficient identity-based signcryption without random oracles
    Lee, Peter Hyun-Jeen
    Parampalli, Udaya
    Narayan, Shivaramakrishnan
    Conferences in Research and Practice in Information Technology Series, 2012, 125 : 3 - 14
  • [13] An Efficient Identity-based Multi-signcryption Scheme
    Qi, Z. H.
    Yang, H. C.
    Huang, H.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
  • [14] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [15] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [16] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Srinivasan, Rahul
    Rangan, Chandrasekaran Pandu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
  • [17] Efficient identity-based signcryption scheme for multiple receivers
    Yu, Yong
    Yang, Bo
    Huang, Xinyi
    Zhang, Mingwu
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 13 - +
  • [18] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
  • [19] Identity-Based Hybrid Signcryption
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 534 - +
  • [20] A Survey of Identity-based Signcryption
    Li, Fagen
    Khan, Muhammad Khurram
    IETE TECHNICAL REVIEW, 2011, 28 (03) : 265 - 272