Fully anonymous identity-based broadcast signcryption with public verification

被引:2
|
作者
Liu, Zhaoman [1 ]
Chen, Yanbo [2 ]
Ning, Jianting [3 ]
Zhao, Yunlei [1 ]
机构
[1] Fudan Univ, Dept Comp Sci, Shanghai 200082, Peoples R China
[2] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong 999077, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Broadcast signcryption; Full anonymity; Public verifiability; Statelessness; Identity-based cryptography; ENCRYPTION; EFFICIENT; SECURE; SCHEME; CRYPTANALYSIS;
D O I
10.1016/j.tcs.2024.114464
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the multicast communication scenario, compared with broadcast encryption, broadcast signcryption or multi-receiver signcryption has additional ability to authenticate the source of the message. With the enhanced awareness of privacy preservation, ordinary users pay more attention to the identity leakage in the communication process. The primitive of anonymous broadcast signcryption has been proposed to solve this problem, which provides additional anonymity compared with the existing broadcast signcryption. However, most anonymous broadcast signcryption schemes only ensure the sender's identity concealment but ignore the anonymity of the receiver set. In this paper, we present a fully anonymous identity-based broadcast signcryption scheme, which meets insider unforgeability, outsider confidentiality, identity concealment of sender and full anonymity of the receiver set. In addition, our scheme has two further desirable characteristics. One is public verifiability which means any third party can verify the validity of the message source without knowing the private key provided by the receiver. The other is statelessness which means the user does not need to update the private key due to the join or revocation of other users. Moreover, our scheme has constant-size public parameters and private key as well as constant decryption complexity, which makes the scheme more suitable for deployment in devices with limited storage or low computing power such as IoT devices.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption
    Mandal, Mriganka
    ICT EXPRESS, 2020, 6 (04): : 316 - 319
  • [3] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [4] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [5] Fully anonymous identity-based broadcast encryption without random oracles
    Ren, Y. (ryl1982@shu.edu.cn), 1600, Femto Technique Co., Ltd. (16):
  • [6] Identity-Based Broadcast Signcryption Scheme for Vehicular Platoon Communication
    Zhao, Yanan
    Wang, Yunpeng
    Liang, Yuhao
    Yu, Haiyang
    Ren, Yilong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (06) : 7814 - 7824
  • [7] Fully Secure Identity-based Broadcast Encryption in the Subgroups
    Zhang Leyou
    Hu Yupu
    Wu Qing
    CHINA COMMUNICATIONS, 2011, 8 (02) : 152 - 158
  • [8] Identity-Based Hybrid Signcryption
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 534 - +
  • [9] A Survey of Identity-based Signcryption
    Li, Fagen
    Khan, Muhammad Khurram
    IETE TECHNICAL REVIEW, 2011, 28 (03) : 265 - 272
  • [10] Identity-Based Transitive Signcryption
    Hou, Shuquan
    Huang, Xinyi
    Xu, Li
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 246 - 259