Identity Based Aggregate Signcryption Schemes

被引:0
|
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Shriram, J. [2 ]
Kalaivani, S. [2 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol Madras, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[2] Natl Inst Tech, Trichy, India
关键词
Identity Based Cryptography; Aggregate Signcryption; Provable Security; Bilinear Pairings; Random Oracle Model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An identity-based signature scheme allows any pair of users to communicate securely and to verify each others signatures without exchanging public key certificates. For achieving both confidentiality and authenticity simultaneously, signcryption schemes are used. An aggregate signature scheme is a digital signature scheme that supports aggregation of individual signatures. Given n signatures on n distinct messages signed by n distinct users, it is possible to aggregate all these signatures into a single signature. This signature will convince the verifier that all the n signers have signed the corresponding n messages. In this paper, we introduce the concept of aggregate signcryption which achieves confidentiality, authentication and aggregation efficiently. This helps in improving the communication and the computation efficiency. Also, we extend the scheme to achieve public verifiability with very efficient aggregate verification, that uses fixed number of pairings.
引用
收藏
页码:378 / +
页数:3
相关论文
共 50 条
  • [31] Identity-based signcryption from lattices
    Yan, Jianhua
    Wang, Licheng
    Dong, Mianxiong
    Yang, Yixian
    Yao, Wenbin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3751 - 3770
  • [32] Generalized Hierarchical Identity-Based Signcryption
    Wang, Hao
    Xu, Qiuliang
    Zhao, Xiufeng
    JOURNAL OF COMPUTERS, 2010, 5 (07) : 1078 - 1085
  • [33] A Generic Construction of Identity-Based Signcryption
    Li, Fagen
    Xiong, Hu
    Liao, Yongjian
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 291 - 295
  • [34] The Multilinear maps based Certificateless Aggregate Signcryption Scheme
    Han Yiliang
    Chen Fei
    2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 92 - 99
  • [35] An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System
    Yang, Yi
    He, Debiao
    Vijayakumar, Pandi
    Gupta, Brij B.
    Xie, Qi
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (03): : 1520 - 1531
  • [36] Identity Based Generalized Proxy Signcryption Scheme
    Zhou, Cai-Xue
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 13 - 26
  • [37] Identity Based Public Verifiable Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    PROVABLE SECURITY, 2010, 6402 : 244 - 260
  • [38] Identity Ring SignCryption Based on Consortium Blockchain
    Yu, Huifang
    Lu, Zhirui
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 865 - 873
  • [39] Identity based threshold proxy signcryption scheme
    Wang, M
    Liu, ZJ
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 695 - 699
  • [40] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489