Abstract
Signcryption enables a user to perform digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a cost lesser than sign-then- encrypt approach. As the concept of ring signcryption emerged, various practical applications like electronic transaction protocol and key management protocols, felt the requirement of signer’s privacy, which was lacking in normal signcryption schemes. Without revealing the users’ identity of the ring signcryption can provide confidentiality and authenticity both. In this paper, we present a new ID-based ring signcryption scheme, motivated to the scheme provided by Zhu et al. [1]. Selvi et al. [2] and Wang et al. [3] found some security flaws in the Zhu’s scheme [1], which is being considered and repaired in this paper. The proposed scheme is proven to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhu Z, Zhang Y, Wang F (2008) An efficient and provable secure identity based ring signcryption scheme. Computer standards & interfaces, pp 649–654
Selvi SSD, Vivek SS, Rangan CP (2009) On the security of identity based ring signcryption schemes. In: Proceedings of 12th International Conference on ISC 2009, Pisa, Italy, Sept 7–9, 2009, Proceedings of LNCS 5735, Springer, Berlin, pp 310–325
Wang H, Yu H (2008) Cryptanalysis of two ring signcryption schemes. In: Inscrypt 2008, LNCS-5487, Springer, Berlin, pp 41–46
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO ‘84, LNCS 196, Springer, Berlin, pp 47–53
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Proceedings of CRYPTO ‘01, LNCS 2139, Springer, Berlin, pp 213–229
Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Proceedings of advances in cryptology in asiacrypt 2001, LNCS 2248, Springer, Berlin, pp 552–565
Zheng F, Kim K (2002) Id-based blind signature and ring signature from pairings. In: Proceedings of Asiacrypt 02, LNCS 2501, Springer, Berlin, pp 533–547
Zheng Y (1997) Digital signcryption or how to achieve cost (signature and encryption) cost (signature) + cost(encryption)’. In: Proceedings of CRYPTO-97, pp 165–179
Baek J, Steinfeld R, Zheng Y (2002) Formal proofs for the security of signcryption. In: Proceedings of PKC—02, LNCS 2274, pp 81–98
Huang X, Susilo W, Mu Y, Zhang F (2005) Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: Proceedings of AINA 05, Taipei, Taiwan, pp 649–654
Wang L, Zhang G, Ma C (2007) A secure ring signcryption scheme for private and anonymous communication. In: Proceedings of international conference NPC workshops, 2007
Zhu L, Zhang F (2008) Efficient identity based ring signature and ring signcryption schemes. In: Proceedings of international conference on CIS’08, vol 2, pp 303–307
Li F, Xiong H, Yu Y (2008) An efficient ID-based ring signcryption scheme. In: Proceedings of ICCCCAS 2008, Xiamen, pp 542–546
Yu Y, Li F, Xu C, Sun Y (2008) An efficient identity-based anonymous signcryption scheme. Wuhan Univ J Nat Sci 13(6):670–674
Zhang J, Gao S, Chen H, Geng Q (2009) A novel id-based anonymous signcryption scheme. In: Proceedings of APWeb/WAIM, LNCS 5446, Springer, Berlin, pp 604–610
Li F, Shirase M, Takagi T (2008) Analysis and improvement of authenticatable ring signcryption scheme. J Shanghai Jiaotong Univ (Sci) 13(6):679–683
Qi ZH, Yang G, Ren XY, Li YW (2010) An ID-based ring signcryption scheme for wireless sensor networks. In: Proceedings of IET International of Conference WSN, China, pp 368–373
Selvi SSD, Vivek SS, Rangan CP (2010) Identity based ring signcryption with public verifiability. In: Proceedings of SECRYPT—10, LNCS 2010
Zhang M, Zhong Y, Yang B, Zhang W (2009) Analysis and improvement of an id-based anonymous signcryption model. In: Proceedings of ICIC (1), LNCS 5754
Zhou J (2011) An efficient identity-based ring signcryption scheme without random oracles. In: Proceedings of international conference on computer and electrical engineering 4th (ICCEE—11), 2011
Huang XY, Zhang FT, Wu W (2006) Identity-based ring signcryption scheme. Proc Tien Tzu Hsueh Pao/Acta Electronica Sinica 34(2):263–266
Malone-Lee J (2002) Identity based signcryption. J Cryptol 2002/098
Chow SSM, Yiu SM, Hui LCK (2005) Efficient identity based ring signature. In: Proceedings of ACNS 2005, LNCS 3531, Springer, Berlin, pp 499–512
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Sharma, G., Bala, S., Verma, A.K. (2013). An Identity-Based Ring Signcryption Scheme. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_18
Download citation
DOI: https://doi.org/10.1007/978-94-007-5860-5_18
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5859-9
Online ISBN: 978-94-007-5860-5
eBook Packages: EngineeringEngineering (R0)