An Identity-Based Ring Signcryption Scheme

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)

Abstract

Signcryption enables a user to perform digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a cost lesser than sign-then- encrypt approach. As the concept of ring signcryption emerged, various practical applications like electronic transaction protocol and key management protocols, felt the requirement of signer’s privacy, which was lacking in normal signcryption schemes. Without revealing the users’ identity of the ring signcryption can provide confidentiality and authenticity both. In this paper, we present a new ID-based ring signcryption scheme, motivated to the scheme provided by Zhu et al. [1]. Selvi et al. [2] and Wang et al. [3] found some security flaws in the Zhu’s scheme [1], which is being considered and repaired in this paper. The proposed scheme is proven to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA).

Keywords

Identity-based ring signcryption Identity based cryptography Ring signcryption Confidentiality Anonymity Unforgeability Bilinear pairing 

References

  1. 1.
    Zhu Z, Zhang Y, Wang F (2008) An efficient and provable secure identity based ring signcryption scheme. Computer standards & interfaces, pp 649–654Google Scholar
  2. 2.
    Selvi SSD, Vivek SS, Rangan CP (2009) On the security of identity based ring signcryption schemes. In: Proceedings of 12th International Conference on ISC 2009, Pisa, Italy, Sept 7–9, 2009, Proceedings of LNCS 5735, Springer, Berlin, pp 310–325Google Scholar
  3. 3.
    Wang H, Yu H (2008) Cryptanalysis of two ring signcryption schemes. In: Inscrypt 2008, LNCS-5487, Springer, Berlin, pp 41–46Google Scholar
  4. 4.
    Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO ‘84, LNCS 196, Springer, Berlin, pp 47–53Google Scholar
  5. 5.
    Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Proceedings of CRYPTO ‘01, LNCS 2139, Springer, Berlin, pp 213–229Google Scholar
  6. 6.
    Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Proceedings of advances in cryptology in asiacrypt 2001, LNCS 2248, Springer, Berlin, pp 552–565Google Scholar
  7. 7.
    Zheng F, Kim K (2002) Id-based blind signature and ring signature from pairings. In: Proceedings of Asiacrypt 02, LNCS 2501, Springer, Berlin, pp 533–547Google Scholar
  8. 8.
    Zheng Y (1997) Digital signcryption or how to achieve cost (signature and encryption) cost (signature) + cost(encryption)’. In: Proceedings of CRYPTO-97, pp 165–179Google Scholar
  9. 9.
    Baek J, Steinfeld R, Zheng Y (2002) Formal proofs for the security of signcryption. In: Proceedings of PKC—02, LNCS 2274, pp 81–98Google Scholar
  10. 10.
    Huang X, Susilo W, Mu Y, Zhang F (2005) Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: Proceedings of AINA 05, Taipei, Taiwan, pp 649–654Google Scholar
  11. 11.
    Wang L, Zhang G, Ma C (2007) A secure ring signcryption scheme for private and anonymous communication. In: Proceedings of international conference NPC workshops, 2007Google Scholar
  12. 12.
    Zhu L, Zhang F (2008) Efficient identity based ring signature and ring signcryption schemes. In: Proceedings of international conference on CIS’08, vol 2, pp 303–307Google Scholar
  13. 13.
    Li F, Xiong H, Yu Y (2008) An efficient ID-based ring signcryption scheme. In: Proceedings of ICCCCAS 2008, Xiamen, pp 542–546Google Scholar
  14. 14.
    Yu Y, Li F, Xu C, Sun Y (2008) An efficient identity-based anonymous signcryption scheme. Wuhan Univ J Nat Sci 13(6):670–674Google Scholar
  15. 15.
    Zhang J, Gao S, Chen H, Geng Q (2009) A novel id-based anonymous signcryption scheme. In: Proceedings of APWeb/WAIM, LNCS 5446, Springer, Berlin, pp 604–610Google Scholar
  16. 16.
    Li F, Shirase M, Takagi T (2008) Analysis and improvement of authenticatable ring signcryption scheme. J Shanghai Jiaotong Univ (Sci) 13(6):679–683Google Scholar
  17. 17.
    Qi ZH, Yang G, Ren XY, Li YW (2010) An ID-based ring signcryption scheme for wireless sensor networks. In: Proceedings of IET International of Conference WSN, China, pp 368–373Google Scholar
  18. 18.
    Selvi SSD, Vivek SS, Rangan CP (2010) Identity based ring signcryption with public verifiability. In: Proceedings of SECRYPT—10, LNCS 2010Google Scholar
  19. 19.
    Zhang M, Zhong Y, Yang B, Zhang W (2009) Analysis and improvement of an id-based anonymous signcryption model. In: Proceedings of ICIC (1), LNCS 5754Google Scholar
  20. 20.
    Zhou J (2011) An efficient identity-based ring signcryption scheme without random oracles. In: Proceedings of international conference on computer and electrical engineering 4th (ICCEE—11), 2011Google Scholar
  21. 21.
    Huang XY, Zhang FT, Wu W (2006) Identity-based ring signcryption scheme. Proc Tien Tzu Hsueh Pao/Acta Electronica Sinica 34(2):263–266MathSciNetGoogle Scholar
  22. 22.
    Malone-Lee J (2002) Identity based signcryption. J Cryptol 2002/098Google Scholar
  23. 23.
    Chow SSM, Yiu SM, Hui LCK (2005) Efficient identity based ring signature. In: Proceedings of ACNS 2005, LNCS 3531, Springer, Berlin, pp 499–512Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentThapar UniversityPatialaIndia

Personalised recommendations