Efficient Identity-Based Generalized Ring Signcryption Scheme

被引:9
作者
Zhou, Caixue [1 ]
Cui, Zongmin [1 ]
Gao, Guangyong [1 ]
机构
[1] Univ Jiujiang, Sch Informat Sci & Technol, Jiujiang 332005, Jiangxi, Peoples R China
关键词
Ring signature; ring signcryption; bilinear pairing; random oracle model; identity-based cryptography; SIGNATURE;
D O I
10.3837/tiis.2016.12.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.
引用
收藏
页码:5553 / 5571
页数:19
相关论文
共 50 条
[1]  
Abe M, 2002, LECT NOTES COMPUT SC, V2501, P415
[2]  
[Anonymous], 2007173 CRYPT EPRINT
[3]  
[Anonymous], 2008466 CRYPT EPRINT
[4]  
[Anonymous], 2008084 CRYPT EPRINT
[5]   A short identity-based proxy ring signature scheme from RSA [J].
Asaar, Maryam Rajabzadeh ;
Salmasizadeh, Mahmoud ;
Susilo, Willy .
COMPUTER STANDARDS & INTERFACES, 2015, 38 :144-151
[6]   Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE [J].
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Zhou, Jianying .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) :1909-1922
[7]  
Barbosa M., 2008, P 2008 ACM S INF COM, P369
[8]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[9]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8441, P496, DOI 10.1007/978-3-642-55220-5_28
[10]  
Bender A, 2006, LECT NOTES COMPUT SC, V3876, P60