Identity Based Aggregate Signcryption Schemes

被引:0
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Shriram, J. [2 ]
Kalaivani, S. [2 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol Madras, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[2] Natl Inst Tech, Trichy, India
关键词
Identity Based Cryptography; Aggregate Signcryption; Provable Security; Bilinear Pairings; Random Oracle Model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An identity-based signature scheme allows any pair of users to communicate securely and to verify each others signatures without exchanging public key certificates. For achieving both confidentiality and authenticity simultaneously, signcryption schemes are used. An aggregate signature scheme is a digital signature scheme that supports aggregation of individual signatures. Given n signatures on n distinct messages signed by n distinct users, it is possible to aggregate all these signatures into a single signature. This signature will convince the verifier that all the n signers have signed the corresponding n messages. In this paper, we introduce the concept of aggregate signcryption which achieves confidentiality, authentication and aggregation efficiently. This helps in improving the communication and the computation efficiency. Also, we extend the scheme to achieve public verifiability with very efficient aggregate verification, that uses fixed number of pairings.
引用
收藏
页码:378 / +
页数:3
相关论文
共 50 条
  • [21] Identity-Based Hybrid Signcryption
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 534 - +
  • [22] A Survey of Identity-based Signcryption
    Li, Fagen
    Khan, Muhammad Khurram
    IETE TECHNICAL REVIEW, 2011, 28 (03) : 265 - 272
  • [23] Signcryption in hierarchical identity based cryptosystem
    Chow, SSM
    Yuen, TH
    Hui, LCK
    Yiu, SM
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 443 - 457
  • [24] Identity-Based Transitive Signcryption
    Hou, Shuquan
    Huang, Xinyi
    Xu, Li
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 246 - 259
  • [25] Efficient Constructions of Signcryption Schemes and Signcryption Composability
    Matsuda, Takahiro
    Matsuura, Kanta
    Schuldt, Jacob C. N.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 321 - 342
  • [26] Signcryption schemes with anonymity
    Wei B.
    Ou H.
    Tian H.
    Gao C.
    International Journal of Advancements in Computing Technology, 2011, 3 (08) : 127 - 137
  • [27] An efficient identity based generalized signcryption scheme
    Kushwah, Prashant
    Lal, Sunder
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (45) : 6382 - 6389
  • [28] Analysis and improvement of an identity-based signcryption
    Zhang, Yu
    Du, Rui-Ying
    Chen, Jing
    Hou, Jian
    Zhou, Qing
    Wang, Wen-Wu
    Tongxin Xuebao/Journal on Communications, 2015, 36 (11):
  • [29] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310
  • [30] Identity Based Signcryption for Advanced Metering Infrastructure
    Soykan, Elif Ustundag
    Ersoz, Seda Demirag
    Soykan, Gurkan
    2015 3RD INTERNATIONAL ISTANBUL SMART GRID CONGRESS AND FAIR (ICSG), 2015,