Indentity-based broadcast signcryption

被引:46
作者
Li, Fagen [1 ]
Xin, Xiangjun [2 ]
Hue, Yupu [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] Zhengzhou Univ Light Ind, Dept Informat & Comp Sci, Zhengzhou 450002, Henan, Peoples R China
[3] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
network security; identity-based cryptography; broadcast encryption; signcryption; broadcast signcryption;
D O I
10.1016/j.csi.2007.08.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast encryption schemes allow a center to deliver encrypted data to a large set of users so that only a particular subset of privileged users can decrypt it. Most of previous works about broadcast encryption only provide confidentiality of the message. However, when a broadcast system is composed of multiple broadcasters, it raises an issue of authentication and non-repudiation of the message or broadcaster. This issue is especially important for multicasting in computer networks. In this paper, a new concept called broadcast sigrncryption by combining the concepts of broadcast encryption and sigrncryption together is proposed to resolve the authentication and non-repudiation problem in a broadcast system. We also propose an identity-based broadcast signcryption scheme using Chen and Malone-Lee's identity-based signcryption scheme. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 94
页数:6
相关论文
共 35 条
  • [11] Dynamic traitor tracing
    Fiat, A
    Tassa, T
    [J]. JOURNAL OF CRYPTOLOGY, 2001, 14 (03) : 211 - 223
  • [12] Fiat A., 1994, LECT NOTES COMPUTER, V773, P480, DOI DOI 10.1007/3-540-48329-2
  • [13] Fiat Amos., 1986, CRYPTO, V263, P186
  • [14] Garay JA, 2000, LECT NOTES COMPUT SC, V1880, P333
  • [15] GUILLOU LC, 1990, LECT NOTES COMPUT SC, V403, P216
  • [16] Halevy D, 2002, LECT NOTES COMPUT SC, V2442, P47
  • [17] Kiayias A, 2002, LECT NOTES COMPUT SC, V2332, P450
  • [18] Kurnio H, 2003, LECT NOTES COMPUT SC, V2576, P146
  • [19] Kurosawa K, 1998, LECT NOTES COMPUT SC, V1403, P145, DOI 10.1007/BFb0054123
  • [20] A new identity based signcryption scheme from pairings
    Libert, B
    Quisquater, JJ
    [J]. 2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, 2003, : 155 - 158