Efficient identity-based broadcast signcryption schemes

被引:18
|
作者
Kim, Intae [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Hongik Univ, Dept Comp & Informat Commun Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
cryptography; identity-based encryption; broadcast encryption; identity-based broadcast encryption; identity-based broadcast signcryption; CONSTANT-SIZE CIPHERTEXTS; MULTIPLE RECEIVERS; SIGNATURE SCHEMES; RANDOM ORACLES; PRIVATE KEYS; ENCRYPTION; SECURE;
D O I
10.1002/sec.802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of broadcast encryption schemes do not provide source authentication property. This allows an adversary to launch impersonating attacks. Therefore, broadcast encryption scheme without source authentication is not applicable in our real life as it is. In this paper, we propose two source-authenticated broadcast encryption schemes that achieve both confidentiality and authenticity simultaneously. Ciphertexts in both schemes are of constant size, independent of the size of the receiver set. The first scheme is particularly efficient in case of pre-computation, whereas the overall performance of the second scheme is better than that of Selvi et al.'s scheme. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:914 / 925
页数:12
相关论文
共 50 条
  • [21] Identity-Based Transitive Signcryption
    Hou, Shuquan
    Huang, Xinyi
    Xu, Li
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 246 - 259
  • [22] An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings
    Elkamchouchi, Hassan
    Abou El-kheir, Eman
    Abouelseoud, Yasmine
    2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 80 - 85
  • [23] Efficient identity-based multi-recipient signcryption scheme
    Du, Hong-Zhen
    Wen, Qiao-Yan
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2009, 26 (02): : 127 - 131
  • [24] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [25] Analysis of broadcast schemes that implement identity-based encryption algorithms
    Kulakov A.N.
    Aleksandrova E.B.
    Autom. Control Comput. Sci., 8 (790-797): : 790 - 797
  • [26] Analysis and improvement of an identity-based signcryption
    Zhang, Yu
    Du, Rui-Ying
    Chen, Jing
    Hou, Jian
    Zhou, Qing
    Wang, Wen-Wu
    Tongxin Xuebao/Journal on Communications, 2015, 36 (11):
  • [27] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310
  • [28] Identity-based signcryption from lattices
    Yan, Jianhua
    Wang, Licheng
    Dong, Mianxiong
    Yang, Yixian
    Yao, Wenbin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3751 - 3770
  • [29] Generalized Hierarchical Identity-Based Signcryption
    Wang, Hao
    Xu, Qiuliang
    Zhao, Xiufeng
    JOURNAL OF COMPUTERS, 2010, 5 (07) : 1078 - 1085
  • [30] A Generic Construction of Identity-Based Signcryption
    Li, Fagen
    Xiong, Hu
    Liao, Yongjian
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 291 - 295