scispace - formally typeset
Proceedings ArticleDOI

Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world

Reads0
Chats0
TLDR
This paper argues that this is an important cryptographic primitive that must be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth, and presents an efficient IDRSC scheme based on bilinear pairing.
Abstract
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC,). We argue that this is an important cryptographic primitive that must be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth. We also present an efficient IDRSC scheme based on bilinear pairing. As a regular signcryption scheme, our scheme combines the functionality of signature and encryption schemes. However, the idea is to have an identity based system. In our scheme, a user can anonymously sign-crypts a message on behalf of the group. We show that our scheme outperforms a traditional identity based scheme, that is obtained by a standard sign-then-encrypt mechanism, in terms of the length of the ciphertext. We also provide a formal proof of our scheme with the chosen cipher-text security under the decisional bilinear Diffie-Hellman assumption, which is believed to be intractable.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Secure and efficient data transmission in the Internet of Things

TL;DR: A heterogeneous ring signcryption scheme for secure communication from sensors to servers is proposed and it is proved that this scheme has the indistinguishability against adaptive chosen ciphertext attacks (IND-CCA2) and existential unforgeabilityagainst adaptive chosen messages attacks under the computational Diffie–Hellman problem in the random oracle model.
Journal ArticleDOI

Heterogeneous Signcryption With Equality Test for IIoT Environment

TL;DR: A heterogeneous signcryption scheme with equality test (HSC-ET) that enables a sensor in public key infrastructure to execute data encryption and deliver it to the semitrusted entity (cloud server) and is demonstrated to be secure by the rigorous and detailed analysis.
Book ChapterDOI

Identity based ring signature: why, how and what next

TL;DR: This paper describes the extension of ID-based ring signature schemes and the related supporting protocol, reviews the state-of-the-art and discusses a number of interesting open problems.
Book ChapterDOI

An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model

TL;DR: This paper proposes an anonymous identity-based signcryption scheme for multiple receivers in the standard model that satisfies the semantic security, unforgeability and signcrypter identity's ambiguity, and gives the formal security proof on its semantic security under the hardness of Decisional Bilinear Diffie-Hellman problem.
Journal ArticleDOI

An efficient and provable secure identity-based ring signcryption scheme

TL;DR: A new identity-based ring signcryption scheme, which only takes four pairing operations for any group size and is proven to be indistinguishable against adaptive chosen ciphertext ring attacks and existentially unforgeable against adaptive choosing message and identity attacks under the random oracle model.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book ChapterDOI

How to Leak a Secret

TL;DR: A new construction of ring signatures is proposed, which is unconditionally signer-ambiguous, provably secure in the random oracle model, and exceptionally efficient: adding each ring member increases the cost of signing or verifying by a single modular multiplication and a single symmetric encryption.
Book ChapterDOI

Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)

TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Journal Article

Efficient identity based signature schemes based on pairings

TL;DR: In this paper, an efficient identity based signature scheme based on pairings whose security relies on the hardness of the Diffie-Hellman problem in the random oracle model was proposed.