An efficient signcryption scheme with key privacy and its extension to ring signcryption

被引:29
作者
Li, Chung [1 ]
Yang, Guomin [1 ]
Wong, Duncan [1 ]
Deng, Xiaotie [1 ]
Chow, Sherman [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] NYU, Courant Inst Math Sci, Dept Comp Sci, New York, NY 10012 USA
关键词
Signcryption; ring signcryption; privacy; anonymity;
D O I
10.3233/JCS-2009-0374
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Information Processing Letters (2006), Tan pointed out that the anonymous signcryption scheme proposed by Yang, Wong and Deng (YWD) in ISC 2005 provides neither confidentiality nor anonymity. However, no discussion has been made on how a secure scheme can be made and there is no secure scheme available to date. In this paper, we propose a modification of YWD scheme which resolves the security issues of the original scheme without sacrificing its high efficiency and simple design. Indeed, we show that our scheme achieves confidentiality, existential unforgeability and anonymity with more precise reduction bounds. We also give a variation of our scheme and extend it to a ring signcryption scheme by using the technique due to Boneh, Gentry, Lynn and Shacham.
引用
收藏
页码:451 / 473
页数:23
相关论文
共 25 条
[1]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]  
Bao F., 1998, Public Key Cryptography. First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98. Proceedings, P55, DOI 10.1007/BFb0054014
[3]  
Bellare M., 1993, P ACM CCS, V93, P62, DOI DOI 10.1145/168588.168596
[4]  
Bellare Mihir, 2001, ASIACRYPT 2001 LNCS, P566
[5]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[6]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[9]  
Chow S. S. M., 2003, LECT NOTES COMPUTER, P352, DOI DOI 10.1007/978-3-540-24691-6_26
[10]  
Dae Hyun Yum, 2002, Information Security and Cryptology - ICISC 2001. 4th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2288), P305