An Efficient Identity-Based Signcryption Scheme for Multiple Receivers

被引:0
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Srinivasan, Rahul [2 ]
Rangan, Chandrasekaran Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Theoret Comp Sci Lab, Madras 600036, Tamil Nadu, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Bombay, Maharashtra, India
来源
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS | 2009年 / 5824卷
关键词
Multiple Receivers; Signcryption; Identity-Based Cryptography; Provable Security; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper puts forward a new efficient, construction for Multi-Receiver Signcrypton in the Identify-based setting. We consider a scenario where a user wants to securely send a message to a dynamically changing subset of the receivers in such a way that, non-members of this subset cannot learn the message One obvious solution is to signcrypt the message to each member of the subset and transmit it to each of them m-individually This requires a very long transmission (the number of receivers times the length of the message) and high computation cost. Another simple solution is to provide it key for every possible subset of receivers This requires every user to store a huge number of keys In this case,the storage efficiency is compromised. The goal of this paper is to provide a solution which is efficient, in all three measures i.e. transmission length, storage of keys and computation at both ends. We propose a new scheme that achieves both confidentiality and anthenticity simultaneously in this setting and is the most efficient scheme to date, in the parameters described above. It breaks the barrier of eiphertext length of linear order in the number of receivers and achieves constant sized eiphertext, independent of the size of the receiver
引用
收藏
页码:71 / +
页数:4
相关论文
共 16 条
[1]  
[Anonymous], 2007217 CRYPT EPRINT
[2]  
[Anonymous], LNCS
[3]  
[Anonymous], LNCS
[4]  
[Anonymous], 2008238 CRYPT EPRINT
[5]  
[Anonymous], 2002098 CRYPT EPRINT
[6]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Chen LQ, 2005, LECT NOTES COMPUT SC, V3386, P362
[9]  
Delerablée C, 2007, LECT NOTES COMPUT SC, V4833, P200
[10]  
Duan SS, 2006, LECT NOTES COMPUT SC, V4058, P195