Indentity-based broadcast signcryption

被引:46
作者
Li, Fagen [1 ]
Xin, Xiangjun [2 ]
Hue, Yupu [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] Zhengzhou Univ Light Ind, Dept Informat & Comp Sci, Zhengzhou 450002, Henan, Peoples R China
[3] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
network security; identity-based cryptography; broadcast encryption; signcryption; broadcast signcryption;
D O I
10.1016/j.csi.2007.08.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption schemes allow a center to deliver encrypted data to a large set of users so that only a particular subset of privileged users can decrypt it. Most of previous works about broadcast encryption only provide confidentiality of the message. However, when a broadcast system is composed of multiple broadcasters, it raises an issue of authentication and non-repudiation of the message or broadcaster. This issue is especially important for multicasting in computer networks. In this paper, a new concept called broadcast sigrncryption by combining the concepts of broadcast encryption and sigrncryption together is proposed to resolve the authentication and non-repudiation problem in a broadcast system. We also propose an identity-based broadcast signcryption scheme using Chen and Malone-Lee's identity-based signcryption scheme. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 94
页数:6
相关论文
共 35 条
  • [1] Anzai J, 1999, LECT NOTES COMPUT SC, V1716, P333
  • [2] BAEK J, 2002, LECT NOTES COMPUTER, V2274, P80, DOI DOI 10.1007/S00145-007-0211_0
  • [3] Bao F, 1998, LNCS, P55
  • [4] Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
  • [5] BONEH D, 2001, LNCS, V2139
  • [6] Boneh D., 1999, CRYPTO, DOI DOI 10.1007/3-540-48405-1
  • [7] Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
  • [8] Chen LQ, 2005, LECT NOTES COMPUT SC, V3386, P362
  • [9] Tracing traitors
    Chor, B
    Fiat, A
    Naor, M
    Pinkas, B
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 893 - 910
  • [10] Chow SSM, 2004, LECT NOTES COMPUT SC, V2971, P352