An Identity-Based Threshold Signcryption Scheme with Semantic Security
- 712 Downloads
This paper designs a secure identity-based threshold signcryption scheme from the bilinear pairings. The construction is based on the recently proposed signcryption scheme of Libert and Quisquater . Our scheme not only has the properties of identity-based and threshold, but also can achieve semantic security under the Decisional Bilinear Diffie-Hellman assumption. It can be proved secure against forgery under chosen message attack in the random oracle model. In the private key distribution protocol, we adopt such method that the private key associated with an identity rather than the master key is shared. In the threshold signcryption phase, we provide a new method to check the malicious members. This is the first identity-based threshold signcryption scheme that can simultaneously achieve both semantic security and others security, such as unforgeability, robustness, and non-repudiation.
KeywordsSignature Scheme Bilinear Pairing Random Oracle Model Honest Party Security Notion
Unable to display preview. Download preview PDF.
- 3.Baek, J., Zheng, Y.: Identity-based threshold signature scheme from the bilinear pairings. In: IAS 2004 track of ITCC 2004, pp. 124–128. IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
- 5.Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive (2002), http://eprint.iacr.org/2002/098/
- 6.Libert, B., Quisquater, J.-J.: New identity based signcryption schemes from pairings. Cryptology ePrint Archive (2003), http://eprint.iacr.org/2003/023/
- 9.Chen, L., Malone-Lee, J.: Improved identity-based signcryption. Cryptology ePrint Archive (2004), http://eprint.iacr.org/2004/114/
- 12.Lynn, B.: Authenticated identity-based encryption. Cryptology ePrint Archive (2002), http://eprint.iacr.org/2002/072/
- 14.Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature) + cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar