ID-based Signcryption Scheme with (t, n) Shared Unsigncryption

نویسندگان

  • Fagen Li
  • Xiangjun Xin
  • Yupu Hu
چکیده

An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero knowledge proof for the equality of two discrete logarithms based on the bilinear map. In this scheme, any third party can verify the validity of the signature, but only more than t members in the recipient group can cooperatively recover the message m. As compared to the Zhang et al.’s signcryption scheme with (t, n) shared unsigncryption based on discrete logarithms, the proposed scheme has the following advantages: it provides both public verifiability and forward security; the key management problem is simplified because of using identity-based cryptosystem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption

In this paper the ID-based signcryption scheme of Li, Xin, and Hu is extended to a compartmented scheme. If an organization is partitioned into different compartments, this scheme allows any member of a specific compartment to participate in the unsigncryption; moreover, each member of a compartment has information unique to that individual. This construction is the first (to the authors’ knowl...

متن کامل

Signcryption schemes with threshold unsigncryption, and applications

The goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security and reliability in some applications, the unsigncryption phase can be distributed among a group of users, through a (t, n)-threshold process. In this work we consider this task of threshold unsignc...

متن کامل

A Pairing Free Identity Based Proxy Signature Scheme

Digital signature scheme is a method for signing an electronic message. As such, a signed message can be transmitted over a computer network in an authenticated manner. This paper introduces two identity based (id-based) digital signature schemes. The first one, is a signature scheme and the second its extension to a proxy signature scheme in which the original signer delegates his signing righ...

متن کامل

An Efficient ID-Based Proxy Signcryption Scheme

Received June 30 th , 2012 Revised July 10 th , 2012 Accepted July 22 th , 2012 Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step, at lower computational cost and communication over heads than the signature-then-encryption. Proxy signcryption schemes are variations of ordinary signcryption schemes and have been useful in many applications ...

متن کامل

On the Security of ID Based Signcryption Schemes

A signcryption scheme is secure only if it satisfies both the confidentiality and the unforgeability properties. All the ID based signcryption schemes presented in the standard model till now do not have either the confidentiality or the unforgeability or both of these properties. Cryptanalysis of some of the schemes have been proposed already. In this work, we present the security attack on ‘S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2006