Advertisement

An Identity-Based Threshold Signcryption Scheme with Semantic Security

  • Changgen Peng
  • Xiang Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)

Abstract

This paper designs a secure identity-based threshold signcryption scheme from the bilinear pairings. The construction is based on the recently proposed signcryption scheme of Libert and Quisquater [6]. Our scheme not only has the properties of identity-based and threshold, but also can achieve semantic security under the Decisional Bilinear Diffie-Hellman assumption. It can be proved secure against forgery under chosen message attack in the random oracle model. In the private key distribution protocol, we adopt such method that the private key associated with an identity rather than the master key is shared. In the threshold signcryption phase, we provide a new method to check the malicious members. This is the first identity-based threshold signcryption scheme that can simultaneously achieve both semantic security and others security, such as unforgeability, robustness, and non-repudiation.

Keywords

Signature Scheme Bilinear Pairing Random Oracle Model Honest Party Security Notion 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Baek, J., Zheng, Y.: Identity-based threshold signature scheme from the bilinear pairings. In: IAS 2004 track of ITCC 2004, pp. 124–128. IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  4. 4.
    Baek, J., Zheng, Y.: Identity-based threshold decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 248–261. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive (2002), http://eprint.iacr.org/2002/098/
  6. 6.
    Libert, B., Quisquater, J.-J.: New identity based signcryption schemes from pairings. Cryptology ePrint Archive (2003), http://eprint.iacr.org/2003/023/
  7. 7.
    Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Chen, X., Zhang, F., Konidala, D.M., Kim, K.: New ID-based threshold signature scheme from bilinear pairings. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 371–383. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Chen, L., Malone-Lee, J.: Improved identity-based signcryption. Cryptology ePrint Archive (2004), http://eprint.iacr.org/2004/114/
  10. 10.
    Libert, B., Quisquater, J.-J.: Efficient signcryption with key privacy from gap Diffie-Hellman groups. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 187–200. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Cha, J., Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  12. 12.
    Lynn, B.: Authenticated identity-based encryption. Cryptology ePrint Archive (2002), http://eprint.iacr.org/2002/072/
  13. 13.
    Duan, S., Cao, Z., Lu, R.: Robust ID-based threshold signcryption scheme form pairings. In: Proceedings of the 3rd international conference on Information security (Infosecu 2004), pp. 33–37. ACM Press, New York (2004)CrossRefGoogle Scholar
  14. 14.
    Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature) + cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  15. 15.
    Shamir, A.: Identity based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Changgen Peng
    • 1
  • Xiang Li
    • 1
  1. 1.Institute of Computer ScienceGuizhou UniversityGuiyangChina

Personalised recommendations