Fully anonymous identity-based broadcast signcryption with public verification

被引:2
|
作者
Liu, Zhaoman [1 ]
Chen, Yanbo [2 ]
Ning, Jianting [3 ]
Zhao, Yunlei [1 ]
机构
[1] Fudan Univ, Dept Comp Sci, Shanghai 200082, Peoples R China
[2] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong 999077, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Broadcast signcryption; Full anonymity; Public verifiability; Statelessness; Identity-based cryptography; ENCRYPTION; EFFICIENT; SECURE; SCHEME; CRYPTANALYSIS;
D O I
10.1016/j.tcs.2024.114464
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the multicast communication scenario, compared with broadcast encryption, broadcast signcryption or multi-receiver signcryption has additional ability to authenticate the source of the message. With the enhanced awareness of privacy preservation, ordinary users pay more attention to the identity leakage in the communication process. The primitive of anonymous broadcast signcryption has been proposed to solve this problem, which provides additional anonymity compared with the existing broadcast signcryption. However, most anonymous broadcast signcryption schemes only ensure the sender's identity concealment but ignore the anonymity of the receiver set. In this paper, we present a fully anonymous identity-based broadcast signcryption scheme, which meets insider unforgeability, outsider confidentiality, identity concealment of sender and full anonymity of the receiver set. In addition, our scheme has two further desirable characteristics. One is public verifiability which means any third party can verify the validity of the message source without knowing the private key provided by the receiver. The other is statelessness which means the user does not need to update the private key due to the join or revocation of other users. Moreover, our scheme has constant-size public parameters and private key as well as constant decryption complexity, which makes the scheme more suitable for deployment in devices with limited storage or low computing power such as IoT devices.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] An Improved Identity-Based Ring Signcryption Scheme
    Deng, Lunzhi
    Liu, Chenglian
    Wang, Xiangbin
    INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 46 - 54
  • [42] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694
  • [43] A new identity-based ring signcryption scheme
    Deng, Lunzhi, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06):
  • [44] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [45] Fully secure anonymous identity based broadcast encryption with group of prime order
    Ming, Yang
    Yuan, Hongping
    International Journal of Network Security, 2019, 21 (01) : 7 - 16
  • [46] Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession
    Wang, Huaqun
    He, Debiao
    Yu, Jia
    Wang, Zhiwei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 824 - 835
  • [47] Identity-based mix: Anonymous communications without public key certificates
    Zhong, Sheng
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (05) : 705 - 711
  • [48] Anonymous Multireceiver Identity-Based Encryption
    Fan, Chun-I
    Huang, Ling-Ying
    Ho, Pei-Hsiu
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) : 1239 - 1249
  • [49] Broadcast encryption using identity-based public-key cryptosystem
    Lv, XX
    Yang, B
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1092 - 1097
  • [50] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128