Identity Based Aggregate Signcryption Schemes

被引:0
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Shriram, J. [2 ]
Kalaivani, S. [2 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol Madras, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[2] Natl Inst Tech, Trichy, India
关键词
Identity Based Cryptography; Aggregate Signcryption; Provable Security; Bilinear Pairings; Random Oracle Model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An identity-based signature scheme allows any pair of users to communicate securely and to verify each others signatures without exchanging public key certificates. For achieving both confidentiality and authenticity simultaneously, signcryption schemes are used. An aggregate signature scheme is a digital signature scheme that supports aggregation of individual signatures. Given n signatures on n distinct messages signed by n distinct users, it is possible to aggregate all these signatures into a single signature. This signature will convince the verifier that all the n signers have signed the corresponding n messages. In this paper, we introduce the concept of aggregate signcryption which achieves confidentiality, authentication and aggregation efficiently. This helps in improving the communication and the computation efficiency. Also, we extend the scheme to achieve public verifiability with very efficient aggregate verification, that uses fixed number of pairings.
引用
收藏
页码:378 / +
页数:3
相关论文
共 50 条
  • [1] Construction of Identity Based Signcryption Schemes
    Pandey, Sumit Kumar
    Barua, Rana
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 1 - 14
  • [2] On the Security of Identity Based Ring Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 310 - 325
  • [3] Cryptanalysis of Two Identity Based Signcryption Schemes
    Xia, Qi
    Xu, Chunxiang
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
  • [4] Identity-based proxy signcryption schemes
    Jian, Wu
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [5] Leakage resilient identity-based aggregate signcryption
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
    210023, China
    Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):
  • [6] Pairing free identity based aggregate signcryption scheme
    Abouelkheir, Eman
    El-sherbiny, Shamia
    IET INFORMATION SECURITY, 2020, 14 (06) : 625 - 632
  • [7] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [8] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698
  • [9] A computational review of identity-based signcryption schemes
    Mandal, Murari
    Sharma, Gaurav
    Verma, Anil K.
    International Journal of Network Security, 2016, 18 (05) : 969 - 977
  • [10] IBASC: Identity based aggregate signcryption scheme with public verifiability
    Han, Yiliang
    Lu, Wanyi
    Yang, Xiaoyuan
    ICIC Express Letters, 2013, 7 (07): : 2075 - 2080