Anonymous Hybrid Signcryption Scheme with Multi-Receiver (Multi-Message) Based on Identity
Author:
Affiliation:

Clc Number:

TP309

Fund Project:

National Key Research and Development Program of China (2017YFB0802000); National Natural Science Foundation of China (61572303, 61772326); Foundation of State Key Laboratory of Information Security (Institute of Information Engineering, The Chinese Academy of Sciences) (2017-MS-03); National Cryptography Development Fund during the "13th Five-year Plan" Period (MMJJ20170216); Fundamental Research Funds for the Central Universities (GK201702004)

  • Article
  • | |
  • Metrics
  • |
  • Reference [31]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Authentication and confidentiality, as well as sender and receiver anonymity are essential in broadcast communication. In this paper, an anonymous hybrid signcryption scheme with multi-receiver is proposed using identity-based cryptography. The proposal does not contain receiver's identity list, and the identity of sender is included in an identity set. Thus, it not only obtains the receiver's anonymity, but also achieves the sender's anonymity. Additionally, the proof of security and the analysis of correctness demonstrate that the scheme is secure and effective. Compared with the pre-existing schemes, the proposal enjoys better performances in many perspectives, including confidentiality, unforgeability, higher anonymity of sender and receiver and public verifiability. Moreover, the presented method can be improved to develop an efficient construction of hybrid signcryption scheme with multi-message and multi-receiver, which can obtain these security properties, such as sender and receiver anonymity, public verifiability and non-repudiation. Finally, the new variant can achieve the requirement of sending multi-message in broadcast communication.

    Reference
    [1] Zheng YL. Digital signcryption or how to achieve cost(Signature & Encryption)<
    [2] Dent AW. Hybrid signcryption schemes with outsider security. In:Proc. of the Int'l Conf. on Information Security (ISC 2005). 2005. 203-217.[doi:10.1007/11556992_15]
    [3] Dent AW. Hybrid signcryption schemes with insider security. In:Proc. of the Australasian Conf. on Information Security and Privacy (ACISP 2005). 2005. 253-266.[doi:10.1007/11506157_22]
    [4] Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. Siam Journal on Computing, 2004,33(1):167-226.[doi:10.1137/S0097539702403773]
    [5] Li X, Qian H, Weng J, Yu Y. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical & Computer Modelling, 2013,57(3-4):503-511.[doi:10.1016/j.mcm.2012.06.030]
    [6] Ch SA, Uddin N, Sher M, Ghani A, Naqvi H, Irshad A. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools & Applications, 2015,74(5):1711-1723.[doi:10.1007/s11042-014-2283-9]
    [7] Duan S, Cao Z. Efficient and provably secure multi receiver identity based signcryption. In:Proc. of the 11th Australasian Conf. on Information Security and Privacy. 2006. 195-206.[doi:10.1007/11780656_17]
    [8] Han Y, Gui X. Adaptive secure multicast in wireless networks. Int'l Journal of Communication Systems, 2009,22(9):1213-1239.[doi:10.1002/dac.1023]
    [9] Wang X, Shu J, Zheng W, Liu L, Fan X. New multi-receiver ID-based ring signcryption scheme. Lecture Notes in Electrical Engineering, 2014,238:2251-2257.[doi:10.1007/978-1-4614-4981-2_246]
    [10] Wang H, Zhang Y, Qin B. Analysis and improvements of two identity based anonymous signcryption schemes for multiple receivers. In:Proc. of the IEEE Int'l Conf. on Trust, Security and Privacy in Computing and Communications. 2012. 1057-1062.[doi:10.1109/TrustCom.2012.88]
    [11] Lal S, Kushwah P. Anonymous ID based signcryption scheme for multiple receivers. Cryptology ePrint Archive:Report 2009/345, 2009.
    [12] Yu Y, Yang B, Huang X, Zhang M. Efficient identity based signcryption scheme for multiple receivers. In:Proc. of the 4th Int'l Conf. on Autonomic and Trusted Computing. 2007. 13-21.[doi:10.1007/978-3-540-73547-2_4]
    [13] Sharnila S, Sree S, Srinivasan R, Pandu C. An efficient identity based signcryption scheme for multiple receivers. In:Proc. of the 4th Int'l Workshop on Advances in Information and Computer Security. 2009. 71-88.[doi:10.1007/978-3-642-04846-3_6]
    [14] Qin H, Dai Y, Wang Z. Identity based multi-reveiver threshold signcryption scheme. Security and Communication Networks, 2010, 3(6):535-545.[doi:10.1002/sec.259]
    [15] Zhang B, Xu Q. An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model. Int'l Journal of Advanced Science and Technology, 2010,20(7):9-24.
    [16] Pang LJ, Cui JJ, Li HX, Pei QQ, Jiang ZT, Wang YM. A new multi-receiver ID-based anonymous signcryption. Chinese Journal of Computers, 2011,34(11):2104-2112(in Chinese with English abstract).
    [17] Li HX, Ju LF. Security analysis and improvement of an anonymous multi-receiver signcryption scheme. ACTA Electronica Sinica, 2015,43(11):2187-2193(in Chinese with English abstract).
    [18] Pang LJ, Gao L, Li HX, Wang YM. Anonymous multi-receiver ID-based signcryption scheme. IET Information Security, 2015,9(3):194-201.[doi:10.1049/iet-ifs.2014.0360]
    [19] Swapna G, Reddy PV. Efficient identity based multi-signcryption scheme with public verifiability. Journal of Discrete Mathematical Sciences & Cryptography, 2014,17(2):181-190.[doi:10.1080/09720529.2013.867674]
    [20] Din N, Umar AI, Waheed A, Amin NU. An efficient multi-message multi-receiver signcryption scheme with forward secrecy on elliptic curves. Cryptology ePrint Archive:Report 2015/655, 2015.
    [21] Kang L, Tang XH, Liu JF. Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability. Science China Information Sciences, 2014,57(11):1-14.[doi:10.1007/s11432-014-5166-9]
    [22] Bjørstad TE. Hybrid signcryption. In:Dent A, Zheng Y, eds. Practical Signcryption. Information Security and Cryptography. Berlin, Heidelberg:Springer-Verlag, 121-147.
    [23] Sun YX, Li H. Efficient certificateless hybrid signcryption. Ruan Jian Xue Bao/Journal of Software, 2011,22(7):1690-1698(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3825.htm[doi:10.3724/SP.J.1001.2011.03825]
    [24] Tong RY, Meng QX, Chen M. Effective and secure identity-based hybrid signcryption scheme. Journal of Computer Applications, 2013,33(5):1382-1385, 1393(in Chinese with English abstract).[doi:10.3724/SP.J.1087.2013.01382]
    [25] Sun YX, Li H. ID-Based signcryption KEM to multiple recipients. Chinese Journal of Electronics, 2011,20(2):317-322.
    [26] Han Y, Yue Z, Fang D, Yang XY. New multivariate-based certificateless hybrid signcryption scheme for multi-recipient. Wuhan University Journal of Natural Sciences, 2014,19(5):433-440.[doi:10.1007/s11859-014-1036-y]
    附中文参考文献:
    [16] 庞辽军,崔静静,李慧贤,斐庆祺,姜正涛,王育民.新的基于身份的多接收者匿名签密方案.计算机学报,2011,34(11):2104-2112.
    [17] 李慧贤,巨龙飞.对一个匿名多接收者签密方案的安全性分析与改进.电子学报,2015,43(11):2187-2193.
    [23] 孙银霞,李晖.高效无证书混合签密.软件学报,2011,22(7):1690-1698. http://www.jos.org.cn/1000-9825/3825.htm[doi:10.3724/SP.J.1001.2011.03825]
    [24] 仝瑞阳,孟庆见,陈明.高效安全的身份混合签密方案.计算机应用,2013,33(5):1382-1385,1393.[doi:10.3724/SP.J.1087.2013.01382]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

周彦伟,杨波,王青龙.基于身份的多接收者(多消息)匿名混合签密机制.软件学报,2018,29(2):442-455

Copy
Share
Article Metrics
  • Abstract:3449
  • PDF: 5241
  • HTML: 1622
  • Cited by: 0
History
  • Received:September 18,2016
  • Revised:November 17,2016
  • Online: March 27,2017
You are the first2049860Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063