Identity-Based Multi-Signcryption with Public Verifiability

Article Preview

Abstract:

Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based multi-signcryption scheme cannot offer the function of public verifiability, based on identity and bilinear pairing on the Elliptic Curve, a new scheme with public verifiability is proposed. In the scheme, with the steps which is comparatively independent to the signcryption process, it can provide the public verification of each signcryption in need. Therefore, our scheme efficiently achieves the cryptographic functions of multi-signcryption.

You have full access to the following eBook

Info:

Periodical:

Pages:

198-203

Citation:

Online since:

September 2011

Authors:

Export:

Share:

Citation:

[1] Shamir A. Identity-based Cryptosystems and Signature Schemes [ C]/Advances in Cryptology , Crypto'84 : LNCS 196. New York : Springer Verlag , 1984 : 47-53.

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[2] Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]/ Kilian J, ed. Advances in Cryptology-CRYPTO 2001, LNCS 2139. Berlin, Heidelberg: Springer-Verlag, 2001: 213- 229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[3] ZHEN G Y. Digital signcryption or how to achieve cost ( signature &encryption) < < cost ( signature) +cost ( encryption ) [ M ]/ KAL ISKI B. A dvances in Cry ptolog y : CRYPTO 1997 , Berlin : Springer , 1997 : 165-179.

DOI: 10.1007/bfb0052234

Google Scholar

[4] Ma C, Chen K. publicly verifiable authenticated encryption[J]. Electronics Letters, 2003; 39( 3) : 281~282.

DOI: 10.1049/el:20030190

Google Scholar

[5] Wang G L, Bao F , Ma C S . Efficient Authenticated Encryption Schemes with Public Verifiability[C]. In: Proc of the 60th IEEE Vehicular Technology Conference (VTC 2004- Fall) IEEE Computer Society, (2004).

DOI: 10.1109/vetecf.2004.1404665

Google Scholar

[6] Chan W K, Wei V K. A Threshold Proxy Signcryption [C]. Proc. Of International Conference on Security and Management, Monte Carlo Resort, Las Vegas, Nevada, USA, 2002: 24-27.

Google Scholar

[7] Peng Y Q, Xie S Y, Chen Y F et al. A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages. ICCNMC 2005, LNCS 3619, springer- Verlag Berlin Heidelberg, 2005: 1271~1276.

DOI: 10.1007/11534310_133

Google Scholar

[8] Dent Alexander W. Hybrid signcryption schemes wit h insider security. In : Proceedings of t he Information Security and Privacy ACISP 2005 , Brisbane , Aust ralia , 2005 , 253~266.

DOI: 10.1007/11506157_22

Google Scholar

[9] Mitomi S , Miyaji A. A General Model of Multisignature Schemes with Message Flexibility , Order Flexibility , and Order Verifiability [J ] . IEICE Trans on Fundamentals , 2001 , E842A(10): 88-99.

DOI: 10.1007/10718964_25

Google Scholar

[10] Seo S H , Lee S H. A Secure and Flexible Multi-signcryption Scheme [C]/ / ICCSA 2004 : LNCS 3 046. Berlin : Springer Verlag , 2004 : 689-697.

DOI: 10.1007/978-3-540-24768-5_74

Google Scholar

[11] Zhang C R, Xiao G Z. Multi2signcryption scheme using identity and bil inear pairing [J]. JOURNAL OF XID IAN UNIVERSITY, 2007, 34(2): 270-274 (in Chinese).

Google Scholar

[12] Zhang J H, Wang J L, Wang Y M. A multi-signcryption model and its application [J] - Journal of Xidian University(Natural Science 2004(3) (in Chinese).

Google Scholar

[13] Meng T, Zhang X P, Sun S H. identity-Based Multi-Sincryption scheme[J]. Journal of Electronics, 2007, 35(6): 115-117 (in Chinese).

Google Scholar

[14] Duan S, Cao Z. Efficient and Provably Secure Multi-receiver Identity-based Signcryption[C]/Proc. of Australasian Conference on Information Security and Privacy. [S. l. ]: Springer-Verlag, 2006: 195-206.

DOI: 10.1007/11780656_17

Google Scholar

[15] Yu Yong, Yang Bo, Huang Xinyi, et al. Efficient Identity-based Signcryption Scheme for Multiple Receivers[C]/Proc. of ATC'07. [S. l. ]: Springer-Verlag, (2007).

Google Scholar