Fully anonymous identity-based broadcast signcryption with public verification

被引:2
|
作者
Liu, Zhaoman [1 ]
Chen, Yanbo [2 ]
Ning, Jianting [3 ]
Zhao, Yunlei [1 ]
机构
[1] Fudan Univ, Dept Comp Sci, Shanghai 200082, Peoples R China
[2] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong 999077, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Broadcast signcryption; Full anonymity; Public verifiability; Statelessness; Identity-based cryptography; ENCRYPTION; EFFICIENT; SECURE; SCHEME; CRYPTANALYSIS;
D O I
10.1016/j.tcs.2024.114464
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the multicast communication scenario, compared with broadcast encryption, broadcast signcryption or multi-receiver signcryption has additional ability to authenticate the source of the message. With the enhanced awareness of privacy preservation, ordinary users pay more attention to the identity leakage in the communication process. The primitive of anonymous broadcast signcryption has been proposed to solve this problem, which provides additional anonymity compared with the existing broadcast signcryption. However, most anonymous broadcast signcryption schemes only ensure the sender's identity concealment but ignore the anonymity of the receiver set. In this paper, we present a fully anonymous identity-based broadcast signcryption scheme, which meets insider unforgeability, outsider confidentiality, identity concealment of sender and full anonymity of the receiver set. In addition, our scheme has two further desirable characteristics. One is public verifiability which means any third party can verify the validity of the message source without knowing the private key provided by the receiver. The other is statelessness which means the user does not need to update the private key due to the join or revocation of other users. Moreover, our scheme has constant-size public parameters and private key as well as constant decryption complexity, which makes the scheme more suitable for deployment in devices with limited storage or low computing power such as IoT devices.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Identity-based proxy signcryption schemes
    Jian, Wu
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [22] Anonymous identity-based broadcast encryption technology for smart city information system
    He, Kai
    Weng, Jian
    Mao, Yijun
    Yuan, Huaqiang
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 841 - 853
  • [23] Anonymous identity-based broadcast encryption technology for smart city information system
    Kai He
    Jian Weng
    Yijun Mao
    Huaqiang Yuan
    Personal and Ubiquitous Computing, 2017, 21 : 841 - 853
  • [24] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
  • [25] Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
    Xu, Peng
    Li, Jingnan
    Wang, Wei
    Jin, Hai
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 223 - 233
  • [26] Multipurpose identity-based signcryption - A swiss army knife for identity-based cryptography
    Boyen, X
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 383 - 399
  • [27] An Identity-Based Signcryption on Lattice without Trapdoor
    Wang, Xianmin
    Zhang, Yu
    Gupta, Brij Bhooshan
    Zhu, Hongfei
    Liu, Dongxi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 282 - 293
  • [28] Leakage resilient identity-based aggregate signcryption
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing
    210023, China
    Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):
  • [29] Identity-based signcryption without random oracles
    Narayan, Shivaramakrishnan
    Udaya, Parampalli
    Lee, Peter Hyun-Jeen
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 342 - 347
  • [30] Cryptanalysis of two identity-based signcryption schemes
    Wang, Huaqun
    Zhang, Yuqing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 694 - 698