An ID-based signcryption scheme with compartmented secret sharing for unsigncryption

被引:8
|
作者
Enos, Graham [1 ]
Zheng, Yuliang [2 ]
机构
[1] Univ N Carolina, Dept Math & Stat, Charlotte, NC 28223 USA
[2] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
关键词
Cryptography; Digital signature; Signcryption; Bilinear maps; Compartmented secret sharing; EFFICIENT;
D O I
10.1016/j.ipl.2014.08.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper the ID-based signcryption scheme of Li, Xin, and Hu is extended to a compartmented scheme. If an organization is partitioned into different compartments, this scheme allows any member of a specific compartment to participate in the unsigncryption; moreover, each member of a compartment has information unique to that individual. This construction is the first (to the authors' knowledge) to combine identity-based encryption, Shamir's threshold scheme, and signcryption into an implementable compartmented sharing scheme. Published by Elsevier B.V.
引用
收藏
页码:128 / 133
页数:6
相关论文
共 50 条
  • [1] ID-based threshold unsigncryption scheme from pairings
    Li, FG
    Gao, JT
    Hu, YP
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 242 - 253
  • [2] Revocable ID-based signcryption scheme
    Liu, Zhenhua
    Li, Juanjuan
    Zu, Longhui
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
  • [3] An ID-based broadcast signcryption scheme
    Qi, Zheng-Hua
    Ren, Xun-Yi
    Yang, Geng
    Yao, Zhuo-Yu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
  • [4] A Novel ID-Based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Gao, Shengnan
    Chen, Hua
    Geng, Qin
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 604 - 610
  • [5] Comment on an ID-based Broadcast Signcryption Scheme
    Zhang, Jianhong
    Geng, Qin
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
  • [6] An Efficient ID-Based Ring Signcryption Scheme
    Li, Fagen
    Xiong, Hu
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 542 - 546
  • [7] An ID-based proxy signcryption scheme with fast revocation
    National Key Lab. of ISN, Xidian University, Xi'an 710071, China
    不详
    不详
    Dianzi Yu Xinxi Xuebao, 2008, 3 (672-675):
  • [8] Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    Wang, Hui
    JOURNAL OF COMPUTERS, 2012, 7 (06) : 1345 - 1352
  • [9] ID-based efficient signcryption key encapsulation scheme
    Lai, Xin
    Huang, Xiaofang
    He, Dake
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (05): : 857 - 863
  • [10] A provably secure ID-based mediated signcryption scheme
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +