Skip to main content

Public Verifiable Multi-sender Identity Based Threshold Signcryption

  • Conference paper
EC2ND 2006
  • 215 Accesses

Abstract

In this paper, we present a new identity based signcryption scheme with public verifiability using quadratic residue and pairings over elliptic curves, and give a security proof about the original scheme in the random oracle model. Furthermore, this paper focuses on a multisender(t,n) identity based threshold sighcryption. Finally, we prove the scheme of threshold setting is secure as the original scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption), In Advances in Cryptology — Crypto’97, LNCS 1294, pp. 165–179, 1997.

    Google Scholar 

  2. Y. Mu and V. Varadharajan. Distributed signcryption. INDOCRYPT’00, LNCS 1977, pp. 155–164. Springer-Verlag, 2000.

    Google Scholar 

  3. D. Kwak and S. Moon. Efficient Distributed Signcryption Scheme as Group Signcryption. In: Applied Cryptography and Network Security (ACNS’03), LNCS 2846, pp. 403–417. Springer-Verlag, 2003.

    Google Scholar 

  4. Ran Canetti, Uri Feige, Oded Goldreich, and Moni Naor. Adaptively secure multiparty computation. In Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, pages 639–648, Philadelphia, Pennsylvania, 22–24 May 1996.

    Google Scholar 

  5. R. Canetti, R. Gennaro, S. jarecki, H. Krawczyk, and T. Rabin. Adaptive security for threshold cryptosystems. In Advances in Cyptology-CRYPTO 99. Springer-Verlag, 1999.

    Google Scholar 

  6. S. Micali and P. Rogaway, Secure computaion. In Joan Feigenbaum, editor, Advances in Cryptology — Crypto’91, pages 392–404, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 576.

    Google Scholar 

  7. D. Beaver, Foundations of secure interactive computing. In Joan Feigenbaum, editor, Advances in Cryptology — Crypto’91, pages 377–391, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 576.

    Google Scholar 

  8. V. Shoup. Practical threshold signatures. IBM Reseearch Report RZ3121 (April 19 1999).

    Google Scholar 

  9. Y. Desmedt, Threshold cryptography, European Transactions on Telecommunications, 5(4), 1994.

    Google Scholar 

  10. Y. Desmedt and Y. Frankel, Threshold cryptosystems, Advances in Cryptology, Crypto’89, LNCS Vol. 435, 1989.

    Google Scholar 

  11. Hyung Koo, Hyun-Jeong Kim, Ik Rae Jeong, Dong-Hoon Lee, and Jongin Lim, Jointly unsigncryptable signcryption, WISA 2001, Vol.2, pp. 397–407, 2001.

    Google Scholar 

  12. F. Hess. Efficient identity based signature schemes based on parings, SAC 2002, LNCS 2595, Springer-Verlag, 2003. 310–324

    Google Scholar 

  13. J. Malone-Lee and W. Mao. Two birds one stone: signcryption using RSA. In Topics in Cryptology — proceedings of CT-RSA 2003, LNCS 2612, pp. 211–225. Springer, 2003.

    Google Scholar 

  14. Libert B, Quisquater J J. New Identity Based Signcryption Based on Parings. Cryptology ePrint Archive, Report 2003/023, http://eprint.iacer.org, February 2003

    Google Scholar 

  15. Boneh D, Franklin M. Identity Based Encryption from the Weir Paring, Advances in Cryptology-Crypto’01, LNCS 2139, Springer-Verlag, 2001. 213–219

    Google Scholar 

  16. Rabin M O. Digitalized Signatures and Public Key Functions as Intractable as Factorization. MIT Laboratory for Computer Science, 1979, MIT/LCS/TR-212.

    Google Scholar 

  17. Baek J, Ron S, Zheng Y. Formal Proofs for the Security Signcryption, PKC 2002, LNCS 2274, Springer-Verlag, 2002. 80–98

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag London Limited

About this paper

Cite this paper

Chen, W., Lei, F., Guo, F., Chen, G. (2007). Public Verifiable Multi-sender Identity Based Threshold Signcryption. In: EC2ND 2006. Springer, London. https://doi.org/10.1007/978-1-84628-750-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-750-3_4

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-749-7

  • Online ISBN: 978-1-84628-750-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics