Advertisement

ID-Based Threshold Unsigncryption Scheme from Pairings

  • Fagen Li
  • Juntao Gao
  • Yupu Hu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Abstract

An identity-based threshold unsigncryption scheme is proposed, which is the integration of the signcryption scheme, the (t,n) threshold scheme and zero knowledge proof for the equality of two discrete logarithms based on the bilinear map. In this scheme, a signcrypted message is decrypted only when more than t members join an unsigncryption protocol and the signature can be verified by any third party. A formal proof of security of this scheme is provided in the random oracle model, assuming the Decisional Bilinear Diffie-Hellman problem is computationally hard.

Keywords

Identity-based cryptography signcryption (t and n) threshold zero knowledge proof 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80–98. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Baek, J., Zheng, Y.: Identity-based threshold decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 262–276. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55–59. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  4. 4.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Koo, J.H., Kim, H.J., Jeong, I.R.: Jointly unsigncryptable signcryption schemes. In: Proceedings of WISA 2001, pp. 397–407 (2001)Google Scholar
  7. 7.
    Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals E81-A(1), 20–26 (1998)MathSciNetGoogle Scholar
  8. 8.
    Libert, B., Quisquater, J.: New identity based signcryption schemes from pairings. In: Proceedings of 2003 IEEE information theory workshop, pp. 155–158 (2003)Google Scholar
  9. 9.
    Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive, Report 2002/098 (2002), Available from: http://eprint.iacr.org/2002/098
  10. 10.
    Malone-Lee, J., Mao, W.: Two birds one stone: Signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211–225. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Shamir, A.: How to share a secret. Communications of the ACM 24(11), 612–613 (1979)CrossRefMathSciNetGoogle Scholar
  12. 12.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  13. 13.
    Steinfeld, R., Zheng, Y.: A signcryption scheme based on integer factorizatio. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975, pp. 308–322. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Zhang, Z., Mian, C., Jin, Q.: Signcryption scheme with threshold shared unsigncryption preventing malicious receivers. Proceedings of IEEE TENCON 2002, 196–199 (2002)Google Scholar
  15. 15.
    Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Fagen Li
    • 1
  • Juntao Gao
    • 1
  • Yupu Hu
    • 1
  1. 1.Key Laboratory of Computer Networks and Information Security, Ministry of EducationXidian UniversityXi’anP.R. China

Personalised recommendations