Efficient identity-based broadcast signcryption schemes

被引:18
|
作者
Kim, Intae [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Hongik Univ, Dept Comp & Informat Commun Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
cryptography; identity-based encryption; broadcast encryption; identity-based broadcast encryption; identity-based broadcast signcryption; CONSTANT-SIZE CIPHERTEXTS; MULTIPLE RECEIVERS; SIGNATURE SCHEMES; RANDOM ORACLES; PRIVATE KEYS; ENCRYPTION; SECURE;
D O I
10.1002/sec.802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of broadcast encryption schemes do not provide source authentication property. This allows an adversary to launch impersonating attacks. Therefore, broadcast encryption scheme without source authentication is not applicable in our real life as it is. In this paper, we propose two source-authenticated broadcast encryption schemes that achieve both confidentiality and authenticity simultaneously. Ciphertexts in both schemes are of constant size, independent of the size of the receiver set. The first scheme is particularly efficient in case of pre-computation, whereas the overall performance of the second scheme is better than that of Selvi et al.'s scheme. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:914 / 925
页数:12
相关论文
共 50 条
  • [31] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489
  • [32] AN EFFICIENT IDENTITY-BASED RING SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
    Sun Hua
    Guo Li
    Wang Aimin
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 673 - +
  • [33] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Jianchang Lai
    Yi Mu
    Fuchun Guo
    International Journal of Information Security, 2017, 16 : 299 - 311
  • [34] A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
    Hundera, Negalign Wake
    Mei, Qian
    Xiong, Hu
    Geressu, Dagmawit Mesfin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 455 - 472
  • [35] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (03) : 299 - 311
  • [36] Efficient and provably secure multi-receiver identity-based signcryption
    Duan, Shanshan
    Cao, Zhenfu
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 195 - 206
  • [37] Multipurpose identity-based signcryption - A swiss army knife for identity-based cryptography
    Boyen, X
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 383 - 399
  • [38] Fuzzy Identity-based Encryption: New and Efficient Schemes
    Baek, Joonsang
    Susilo, Willy
    Zhou, Jianying
    CODING AND CRYPTOLOGY, 2008, 4 : 1 - +
  • [39] Efficient Identity-based Broadcast Encryption without Random Oracles
    Hu, Liang
    Liu, Zheli
    Cheng, Xiaochun
    JOURNAL OF COMPUTERS, 2010, 5 (03) : 331 - 336
  • [40] An Identity-Based Signcryption on Lattice without Trapdoor
    Wang, Xianmin
    Zhang, Yu
    Gupta, Brij Bhooshan
    Zhu, Hongfei
    Liu, Dongxi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 282 - 293