Efficient identity-based broadcast signcryption schemes

被引:18
|
作者
Kim, Intae [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Hongik Univ, Dept Comp & Informat Commun Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
cryptography; identity-based encryption; broadcast encryption; identity-based broadcast encryption; identity-based broadcast signcryption; CONSTANT-SIZE CIPHERTEXTS; MULTIPLE RECEIVERS; SIGNATURE SCHEMES; RANDOM ORACLES; PRIVATE KEYS; ENCRYPTION; SECURE;
D O I
10.1002/sec.802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of broadcast encryption schemes do not provide source authentication property. This allows an adversary to launch impersonating attacks. Therefore, broadcast encryption scheme without source authentication is not applicable in our real life as it is. In this paper, we propose two source-authenticated broadcast encryption schemes that achieve both confidentiality and authenticity simultaneously. Ciphertexts in both schemes are of constant size, independent of the size of the receiver set. The first scheme is particularly efficient in case of pre-computation, whereas the overall performance of the second scheme is better than that of Selvi et al.'s scheme. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:914 / 925
页数:12
相关论文
共 50 条
  • [41] Identity-based signcryption without random oracles
    Narayan, Shivaramakrishnan
    Udaya, Parampalli
    Lee, Peter Hyun-Jeen
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 342 - 347
  • [42] Leakage resilient identity-based aggregate signcryption
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
    210023, China
    Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):
  • [43] Online/Offline Identity-Based Signcryption Revisited
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 36 - 51
  • [44] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [45] A new identity-based ring signcryption scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Li, Siwei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) : 333 - 342
  • [46] Construction of Identity Based Signcryption Schemes
    Pandey, Sumit Kumar
    Barua, Rana
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 1 - 14
  • [47] Identity Based Aggregate Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Shriram, J.
    Kalaivani, S.
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 378 - +
  • [48] An Efficient and Secure Scheme for Smart Home Communication using Identity-Based Signcryption
    Ashibani, Yosef
    Mahmoud, Qusay H.
    2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,
  • [49] Efficient multi-receiver identity-based signcryption from lattice assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    Xue, Jingting
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 20 - 38
  • [50] An improved identity-based KCDSA signcryption scheme
    Li, Fagen
    Xu, Chunxiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 230 - +