Paper Title:
Identity-Based Multi-Signcryption with Public Verifiability
  Abstract

Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based multi-signcryption scheme cannot offer the function of public verifiability, based on identity and bilinear pairing on the Elliptic Curve, a new scheme with public verifiability is proposed. In the scheme, with the steps which is comparatively independent to the signcryption process, it can provide the public verification of each signcryption in need. Therefore, our scheme efficiently achieves the cryptographic functions of multi-signcryption.

  Info
Periodical
Chapter
Chapter 3: Computational Methods for Engineering
Edited by
Elwin Mao and Linli Xu
Pages
198-203
DOI
10.4028/www.scientific.net/AEF.1.198
Citation
X. Y. Yu, D. K. He, "Identity-Based Multi-Signcryption with Public Verifiability", Advanced Engineering Forum, Vol. 1, pp. 198-203, 2011
Online since
September 2011
Export
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jian Hong Zhang, Hua Chen, Yi Xian Yang
Abstract:As a special anonymous signature, the blindness of blind signatures makes it play an important role in electronic commerce. In this paper we...
1265
Authors: Hui Meng, Xu Qian
Chapter 2: Network & Control
Abstract:Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing...
217
Authors: Shivendu Mishra, Ritika Yaduvanshi, Anjani Kumar Rai, Nagendra Pratap Singh
Chapter 7: Machining
Abstract:In an ID-Based cryptosystem, identity of users are used to generate their public and private keys. In this system private key is generated by...
929
Authors: Bao Yuan Kang
Chapter 1: Mechatronics
Abstract:A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext...
914
Authors: Erl Huei Lu, Henry Ker Chang Chang, Shu Hwang Liaw, Pin Chang Su
Chapter 12: Computer and Information Technologies
Abstract:Recently bilinear pairings have found various applications in cryptosystems. However, a natural open question is to construct a secure and...
3522