Certificateless Multi-Signcryption Scheme without Pairing

Article Preview

Abstract:

Certificateless public key cryptography is a new paradigm that simplifies the traditional PKC and solves the inherent key escrow problem suffered by ID-PKC. As realizing both encryption and signature security goals, certificateless signcryption is one of the most important security primitives in CL-PKC. To adapt multi-user settings, we present a certificateless multi-signcryption scheme without pairing. The performace analysis shows that the scheme is very efficient.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1435-1438

Citation:

Online since:

August 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Shamir, Identity-based cryptosystem and signature scheme, in: Advances in Cryptology-Crypto 1984, LNCS, vol. 196, Springer-Verlag, Berlin, 1984, p.47–53.

Google Scholar

[2] S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in: C.S. Laih (Ed. ), Advances in Cryptology-Asiacrypt 2003, LNCS, vol. 2894, Springer-Verlag, Berlin, 2003, p.452–473.

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar

[3] Zheng Y. Digital signcryption or how to achieve cost (signa-ture & encryption)<<cost(signature)+cost(encryption). Proceedings of the CRYPTO 1997. California, USA, 1997: 165-179.

DOI: 10.1007/bfb0052234

Google Scholar

[4] MITOMI S,MIYAJI A. A general model of multi-signature schemes with message flexibility,order flexibility and order verifiability [J]. IEICE Transactions on Fundamentals, 2001, E84-A(10): 2488-2499.

DOI: 10.1007/10718964_25

Google Scholar

[5] Duan S, Cao Z. Efficient and provably secure multi-receiver identity-based signcryption. Proceedings of the ACISP 2006. Melbourne, Australia, 2006: 195-206.

DOI: 10.1007/11780656_17

Google Scholar

[6] Bellare M, Neven G. Identity-based multi-signatures from RSA. Proceedings of the CT-RSA 2007. CA, USA, 2007: 145-18.

DOI: 10.1007/11967668_10

Google Scholar

[7] Zhang J, Mao J. A novel identity-based multi-signcryption scheme. Computer Communications, 2009, 32(1): 14-18.

DOI: 10.1016/j.comcom.2008.07.004

Google Scholar

[8] Zhang B, Xu Q.L. Identity-based multi-signcryption scheme without random oracles. chinese journal of computers. 2010, 33(1): 103-110.

DOI: 10.3724/sp.j.1016.2010.00103

Google Scholar

[9] Han W.B. Research on Several Signcryption Schemes. PLA Information Engineering University. (2012).

Google Scholar

[10] Z. H. Liu, Y. P. Hu, X. S. Zhang, H. Ma. Certificateless signcryption scheme in the standard model [J]. Information Science, 2010, 180: 452-464.

DOI: 10.1016/j.ins.2009.10.011

Google Scholar

[11] M. Barbosa and P. Farshim. Certificateless signcryption. In ACM Symposium on Information, Computer and Communications Security-ASIACCS 2008, p.369–372, Tokyo, Japan, (2008).

DOI: 10.1145/1368310.1368364

Google Scholar