Abstract
Xiaoyu et. al. [1] presented efficient identity based (K, n) threshold signcryption scheme. In this paper, we present variant of [1] with group shared unsigncryption, which is based on discrete logarithm problem in finite field. For unsigncryption to recover the message the cooperation of group members of the receivers group is required. The proposed scheme has additional advantage against malicious verifiers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhang, X., Zhang, R.: A new id-based (t,n) threshold signcryption scheme. In: Progress in Informatics and Computing (PIC), vol. 1, pp. 589–592. IEEE (2010)
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.K.: Identity based encryption from the weil pairing. IACR Cryptology ePrint Archive 2001, 90 (2001)
Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)
Chen, L., Malone-Lee, J.: Improved Identity-Based Signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005)
Libert, B., Quisquater, J.-J.: New identity based signcryption schemes from pairings. IACR Cryptology ePrint Archive 2003, 23 (2003)
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.I., Lee, D.H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)
Duan, S., Cao, Z., Lu, R.: Robust id-based threshold signcryption scheme from pairings. In: Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, pp. 33–37. ACM, New York (2004), http://doi.acm.org/10.1145/1046290.1046298
Peng, C., Li, X.: An Identity-Based Threshold Signcryption Scheme with Semantic Security. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005, Part II. LNCS (LNAI), vol. 3802, pp. 173–179. Springer, Heidelberg (2005), http://dx.doi.org/10.1007/11596981_26
Kudo, M.: Secured electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals
Ma, C., Chen, K., Zheng, D., Liu, S.: Efficient and Proactive Threshold Signcryption. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 233–243. Springer, Heidelberg (2005)
Li, F., Yu, Y.: An efficient and provably secure id-based threshold signcryption scheme. In: Communications, Circuits and Systems, ICCCAS 2008, pp. 488–499 (2008)
Boyd, C.:
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Desmedt, Y.: Society and Group Oriented Cryptography: A New Concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)
Stinson, D.R.: Cryptography Theory and Practice. Chapman and Hall/CRC (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mishra, P.K., Singh, K., Baruntar, S. (2012). ID-Based Threshold Signcryption and Group Unsigncryption. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)