A Novel Biometric Signcryption Scheme that Is Identity- based and Group-oriented
نویسندگان
چکیده
Received: 11 Mar. 2012; Revised 25 Jul. 2012; Accepted 06 Aug. 2012 Reived: Jul 8, 2011; Revised Oct. 4, 2011; Accepted Jan. 6, 2012 Abstract: The signcryption scheme plays an important role in the applications which need privacy and authentication simultaneously. In order to get high efficiency in one-to-many communication environment and simplify the management of keys, a novel biometric signcryption scheme, identity-based and group-oriented, is proposed in this paper. In the scheme, the sender signcrypts the message and broadcasts it, but only the members of the receiver group can unsigncrypt the cipher text correctly. The implement of the scheme does not need bilinear pairing computation and modular exponentiation computation, hence it is very efficient. The analysis results show that the scheme is secure.
منابع مشابه
An Efficient Biometric Certificateless Signcryption Scheme
Biometric signcryption, which enables a user using his biometric information as the identity to fulfills both the functions of encryption and digital signature simultaneously, and it provides better overall security and performance. However, almost all biometric signcryption schemes that have been proposed in the literature do not satisfy forward secrecy, known session-specific temporary inform...
متن کاملCryptanalysis of an Identity Based Signcryption Scheme without Random Oracles
Signcryption is a cryptographic primitive that aims at providing confidentiality and the sender’s identity authentication in a logic step, at lower computational costs and communication overheads than sign-then-encrypt way. Recently, Yu et al.[1] proposed a new identity based signcryption scheme in standard model. However, in this paper, we show that the scheme still has some security weaknesse...
متن کاملAn Efficient Identity based Multi-Proxy Multi-Signcryption Scheme from Bilinear Pairings
Signcryption is a cryptography primitive that fulfills both the functions of digital signature and encryption and guarantees non-repudiation, confidentiality and integrity in a more efficient way. In this paper, we propose an efficient and secure identity based multi-proxy multi signcryption scheme from bilinear pairings. In this scheme a group of proxy signcrypters could authorize by a group o...
متن کاملID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero knowledge proof for the equality of two discrete logarithms based on the bilinear map. In this scheme, any third party can verify the validity of the signature, but only more than t members in the recipient group can coope...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کامل