Browse > Article
http://dx.doi.org/10.3837/tiis.2016.12.022

Efficient Identity-Based Generalized Ring Signcryption Scheme  

Zhou, Caixue (School of Information Science and Technology, University of Jiujiang)
Cui, Zongmin (School of Information Science and Technology, University of Jiujiang)
Gao, Guangyong (School of Information Science and Technology, University of Jiujiang)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.12, 2016 , pp. 5553-5571 More about this Journal
Abstract
In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.
Keywords
Ring signature; ring signcryption; bilinear pairing; random oracle model; identity-based cryptography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. H. Zhang, S. N. Gao, H. Chen and Q. Geng, "A novel ID-based anonymous signcryption scheme," in Proc. of APWeb/WAIM 2009, pp. 604-610, Apr 2-4, 2009.
2 L. Z. Deng, J. W. Zeng and S. W. Li, "A new identity-based ring signcryption scheme," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 4, pp. 333-342, 2014.   DOI
3 H. Sun, "Efficient certificateless ring signcryption in the standard model," Journal of Computational Information Systems, vol. 10, no. 8, pp. 3181-3188, 2014.
4 Z. Z. Guo, M. C. Li and X. X. Fan, "Attribute-based ring signcryption scheme," Security and Communication Networks, vol. 6, no. 6, pp. 790-796, 2013.   DOI
5 L. Z. Deng, S. W. Li and Y. F. Yu, "Identity-based threshold ring signcryption from pairing," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 2, pp. 90-103, 2014.   DOI
6 M. Barbosa and P. Farshim, "Certificateless signcryption," in Proc. of ASIACCS'2008, pp. 369-372, Mar 18-20, 2008.
7 S. S. M. Chow, S. M. Yiu and L. C. K. Hui, "Efficient identity based ring signature," in Proc. of ACNS 2005, pp. 499-512, Jun 7-10, 2005.
8 PBC library. http://crypto.stanford.edu/pbc.
9 J. W. Liu, Z. H. Zhang, X. F. Chen and K. S. Kwak, "Certificateless remote anonymous authentication schemes for wireless body area networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332-342, 2014.   DOI
10 C. J. Wang and J. Liu, "Attribute-based ring signcryption scheme and its application in wireless body area networks," in Proc. of ICA3PP 2015, pp. 521-530, Nov 18-20, 2015.
11 S. S. M. Chow, J. K. Liu and D. S. Wong, "Robust receipt-free election system with ballot secrecy and verifiability," in Proc. of NDSS'2008, pp. 81-94, Feb 8-11, 2008.
12 R. L. Rivest, A. Shamir and Y. Tauman, "How to leak a secret," in Proc. of AsiaCrypt'2001, pp. 552-565, Dec 9-13, 2001.
13 J. Y. Hwang, L. Q. Chen and H. S. Cho, "Short dynamic group signature scheme supporting controllable linkability," IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1109-1124, 2015.   DOI
14 J. K. Liu, V. K. Wei and D. S. Wong, "Linkable spontaneous anonymous group signature for Ad Hoc groups (extended abstract)," in Proc. of ACISP'2004, pp. 325-335, Jul 13-15, 2004.
15 H. Xiong, Z. Chen and F. G. Li, "Bibber-anonymous english auction protocol based on revocable ring signature," Expert Systems with Applications, vol. 39, no. 8, pp. 7062-7066, 2012.   DOI
16 L. Chen, C. Kudla and K. Paterson, "Concurrent signatures," in Proc. of EuroCrypt'2004, pp. 287-305, May 2-6, 2004.
17 F. Laguillaumie and D. Vergnaud, "Multi-designated verifiers signatures," in Proc. of ICICS' 2004, pp. 495-507, Oct 27-29, 2004.
18 X. Y. Huang, W. Susilo, Y. Mu and F. T. Zhang, "Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world," in Proc. of AINA'2005, pp. 649-654, Mar 28-30, 2005.
19 A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. of Crypto'1984, pp. 47-53, Aug 19-22, 1984.
20 S. Haber and B. Pinkas, "Securely combining public-key cryptosystems," in Proc. of CCS'2001, pp. 215-224, Nov 6-8, 2001.
21 Y. L. Han, X. Y. Yang, P. Wei, Y. M. Wang and Y. P. Hu, "ECGSC: elliptic curve based generalized signcryption," in Proc. of UIC 2006, pp. 956-965, Sep 3-6, 2006.
22 M. I. G. Vasco, F. Hess and R. Steinwandt, "Combined (identity-based) public key schemes," Cryptology ePrint Archive, Report 2008/466 (2008). Available at http://eprint.iacr.org/ 2008/466 [Accessed on 3 Feb 2009].
23 J. S. Coron, M. Joye, D. Naccache and P. Paillier, "Universal padding schemes for RSA," in Proc. of Crypto'2002, pp. 226-241, Aug 18-22, 2002.
24 M. Bellare and P. Rogaway, "The exact security of digital signatures - How to sign with RSA and Rabin," in Proc. of EuroCrypt'1996, pp. 399-416, May 12-16, 1996.
25 Y. C. Komano and K. Ohta, "Efficient universal padding techniques for multiplicative trapdoor one-way permutation," in Proc. of Crypto'2003, pp. 366-382, Aug 17-21, 2003.
26 K. G. Paterson, J. C. N. Schuldt, M. Stam and S. Thomson, "On the joint security of encryption and signature, revisited," in Proc. of AsiaCrypt'2011, pp. 161-178, Dec 4-8, 2011.
27 J. P. Degabriele, A. Lehmann and K. G. Paterson, "On the joint security of encryption and signature in EMV," in Proc. of CT-RSA'2012, pp. 116-135, Feb 27-Mar 2, 2012.
28 C. Chen, J. Chen, H.W. Lim Z. F. Zhang and D. G. Feng, "Combined public-key schemes: the case of ABE and ABS," in Proc. of ProvSec 2012, pp. 53-69, Sep 26-28, 2012.
29 X. A. Wang, X. Y. Yang and Y. L. Han, "Provable secure generalized signcryption," Cryptology ePrint Archive, Report 2007/173 (2007). Available at http://eprint.iacr.org/2007/173 [Accessed on 21 May 2008].
30 M. Bellare, S. Meiklejohn and S. Thomson, "Key-versatile signatures and applications: RKA, KDM and joint enc/sig," in Proc. of EuroCrypt'2014, pp. 496-513, May 11-15, 2014.
31 S. Lal and P. Kushwah, "ID based generalized signcryption," Cryptology ePrint Archive, Report 2008/084 (2008). Available at http://eprint.iacr.org/2008/084 [Accessed on 26 Feb 2008].
32 H. F. Ji, W. B. Han and L. Zhao, "Certificateless generalized signcryption," Cryptology ePrint Archive, Report 2010/204 (2010). Available at http://eprint.iacr.org/2010/204 [accessed on 19 Apr 2010].
33 G. Yu, X. X.Ma, Y. Shen and W. B. Han, "Provable secure identity based generalized signcryption scheme," Theoretical Compute Science, vol. 411, no. 40-42, pp. 3614-3624, 2010.   DOI
34 P. Kushwah and S. Lal, "Efficient generalized signcryption schemes," Cryptology ePrint Archive, Report 2010/346 (2010). Available at http://eprint.iacr.org/2010/346 [Accessed on 16 Jun 2010].
35 Y. L. Han and X. L. Gui, "Adaptive secure multicast in wireless networks," International Journal of Communication Systems, vol. 22, no. 9, pp. 1213-1239, 2009.   DOI
36 C. X. Zhou, W. Zhou and X.W. Dong, "Provable certificateless generalized signcryption scheme," Designs, Codes and Cryptography, vol. 71, no. 2, pp. 331-346, 2014.   DOI
37 M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys," in Proc. of AsiaCrypt'2002, pp.415-432, Dec 1-5, 2002.
38 G. Wei, J. Shao, Y. Xiang, P. P. Zhu, and R. X. Lu, "Obtain confidentiality or/and authenticity in big data by id-based generalized signcryption," Information Sciences, vol. 318, pp. 111-122, 2015.   DOI
39 C. X. Zhou, "An improved multi-receiver generalized signcryption scheme," International Journal of Network Security, vol. 17, no. 3, pp. 340-350, 2015.
40 Y. L. Han, Y. C. Bai, D. Y. Fang and X. Y. Yang, "The new attribute-based generalized signcryption scheme," in Proc. of ICYCSEE'2015, pp. 353-360, 2015.
41 J. Q. Lv and X. M. Wang, "Verifiable ring signature," in Proc. of DMS'2003, pp. 663-667, Sep, 2003.
42 J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)," in Proc. of ACISP, pp. 325-335, Jul. 13-15, 2004.
43 M. H. Au, J. K. Liu, W. Susilo and J. Y. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1909-1922, 2013.   DOI
44 J. K. Liu and D. S.Wong, "On the security models of (Threshold) ring signature schemes," in Proc. of ICISC, pp. 204-217, Dec. 2-3, 2004.
45 J. Herranz and G. Saez, "New identity-based ring signature schemes," in Proc. of ICICS'2004, pp. 27-39, Oct 27-29, 2004.
46 A. Bender, J. Katz and R. Morselli, "Ring signatures: stronger definitions, and constructions without random oracles," in Proc. of TCC, pp. 60-79, Mar. 4-7, 2006.
47 L. J. Zhu and F. T. Zhang, "Efficient id-based ring signature and ring signcryption schemes," in Proc. of CIS'2008, pp. 303-307, Dec 13-17, 2008.
48 L. Z. Deng, "Certificateless ring signature based on RSA problem and DL problem," RAIRO-Theoretical Informatics and Applications, vol. 49, no. 4, pp. 307-318, 2015.   DOI
49 M. R. Asaar, M. Salmasizadeh andW. Susilo, "A short identity-based proxy ring signature scheme from RSA," Computer Standards & Interfaces, vol. 38, pp. 144-151, 2015.   DOI
50 M. H. Au and W. Susilo, "Two-party (blind) ring signatures and their applications," in Proc. of ISPEC, pp. 403-417, May 5-8, 2014.
51 M. W. Zhang, B. Yang, S. L. Zhu and W. Z. Zhang, "Efficient secret authenticatable anonymous signcryption scheme with identity privacy," in Proc. of ISI 2008, pp.126-137, Jun. 17, 2008.
52 F. G. Li, S. Masaaki and T. Tsuyoshi, "Analysis and improvement of authenticatable ring signcryption scheme," Journal of Shanghai Jiaotong University (Science), vol. 13, no. 6, pp. 679-683, 2008.   DOI