DOI QR코드

DOI QR Code

Efficient Identity-Based Generalized Ring Signcryption Scheme

  • Zhou, Caixue (School of Information Science and Technology, University of Jiujiang) ;
  • Cui, Zongmin (School of Information Science and Technology, University of Jiujiang) ;
  • Gao, Guangyong (School of Information Science and Technology, University of Jiujiang)
  • Received : 2015.10.04
  • Accepted : 2016.10.06
  • Published : 2016.12.31

Abstract

In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.

Keywords

References

  1. A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. of Crypto'1984, pp. 47-53, Aug 19-22, 1984.
  2. R. L. Rivest, A. Shamir and Y. Tauman, "How to leak a secret," in Proc. of AsiaCrypt'2001, pp. 552-565, Dec 9-13, 2001.
  3. J. Y. Hwang, L. Q. Chen and H. S. Cho, "Short dynamic group signature scheme supporting controllable linkability," IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1109-1124, 2015. https://doi.org/10.1109/TIFS.2015.2390497
  4. J. K. Liu, V. K. Wei and D. S. Wong, "Linkable spontaneous anonymous group signature for Ad Hoc groups (extended abstract)," in Proc. of ACISP'2004, pp. 325-335, Jul 13-15, 2004.
  5. S. S. M. Chow, J. K. Liu and D. S. Wong, "Robust receipt-free election system with ballot secrecy and verifiability," in Proc. of NDSS'2008, pp. 81-94, Feb 8-11, 2008.
  6. H. Xiong, Z. Chen and F. G. Li, "Bibber-anonymous english auction protocol based on revocable ring signature," Expert Systems with Applications, vol. 39, no. 8, pp. 7062-7066, 2012. https://doi.org/10.1016/j.eswa.2012.01.040
  7. L. Chen, C. Kudla and K. Paterson, "Concurrent signatures," in Proc. of EuroCrypt'2004, pp. 287-305, May 2-6, 2004.
  8. F. Laguillaumie and D. Vergnaud, "Multi-designated verifiers signatures," in Proc. of ICICS' 2004, pp. 495-507, Oct 27-29, 2004.
  9. X. Y. Huang, W. Susilo, Y. Mu and F. T. Zhang, "Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world," in Proc. of AINA'2005, pp. 649-654, Mar 28-30, 2005.
  10. S. Haber and B. Pinkas, "Securely combining public-key cryptosystems," in Proc. of CCS'2001, pp. 215-224, Nov 6-8, 2001.
  11. Y. L. Han, X. Y. Yang, P. Wei, Y. M. Wang and Y. P. Hu, "ECGSC: elliptic curve based generalized signcryption," in Proc. of UIC 2006, pp. 956-965, Sep 3-6, 2006.
  12. J. S. Coron, M. Joye, D. Naccache and P. Paillier, "Universal padding schemes for RSA," in Proc. of Crypto'2002, pp. 226-241, Aug 18-22, 2002.
  13. M. Bellare and P. Rogaway, "The exact security of digital signatures - How to sign with RSA and Rabin," in Proc. of EuroCrypt'1996, pp. 399-416, May 12-16, 1996.
  14. Y. C. Komano and K. Ohta, "Efficient universal padding techniques for multiplicative trapdoor one-way permutation," in Proc. of Crypto'2003, pp. 366-382, Aug 17-21, 2003.
  15. M. I. G. Vasco, F. Hess and R. Steinwandt, "Combined (identity-based) public key schemes," Cryptology ePrint Archive, Report 2008/466 (2008). Available at http://eprint.iacr.org/ 2008/466 [Accessed on 3 Feb 2009].
  16. K. G. Paterson, J. C. N. Schuldt, M. Stam and S. Thomson, "On the joint security of encryption and signature, revisited," in Proc. of AsiaCrypt'2011, pp. 161-178, Dec 4-8, 2011.
  17. J. P. Degabriele, A. Lehmann and K. G. Paterson, "On the joint security of encryption and signature in EMV," in Proc. of CT-RSA'2012, pp. 116-135, Feb 27-Mar 2, 2012.
  18. C. Chen, J. Chen, H.W. Lim Z. F. Zhang and D. G. Feng, "Combined public-key schemes: the case of ABE and ABS," in Proc. of ProvSec 2012, pp. 53-69, Sep 26-28, 2012.
  19. M. Bellare, S. Meiklejohn and S. Thomson, "Key-versatile signatures and applications: RKA, KDM and joint enc/sig," in Proc. of EuroCrypt'2014, pp. 496-513, May 11-15, 2014.
  20. X. A. Wang, X. Y. Yang and Y. L. Han, "Provable secure generalized signcryption," Cryptology ePrint Archive, Report 2007/173 (2007). Available at http://eprint.iacr.org/2007/173 [Accessed on 21 May 2008].
  21. S. Lal and P. Kushwah, "ID based generalized signcryption," Cryptology ePrint Archive, Report 2008/084 (2008). Available at http://eprint.iacr.org/2008/084 [Accessed on 26 Feb 2008].
  22. G. Yu, X. X.Ma, Y. Shen and W. B. Han, "Provable secure identity based generalized signcryption scheme," Theoretical Compute Science, vol. 411, no. 40-42, pp. 3614-3624, 2010. https://doi.org/10.1016/j.tcs.2010.06.003
  23. P. Kushwah and S. Lal, "Efficient generalized signcryption schemes," Cryptology ePrint Archive, Report 2010/346 (2010). Available at http://eprint.iacr.org/2010/346 [Accessed on 16 Jun 2010].
  24. Y. L. Han and X. L. Gui, "Adaptive secure multicast in wireless networks," International Journal of Communication Systems, vol. 22, no. 9, pp. 1213-1239, 2009. https://doi.org/10.1002/dac.1023
  25. H. F. Ji, W. B. Han and L. Zhao, "Certificateless generalized signcryption," Cryptology ePrint Archive, Report 2010/204 (2010). Available at http://eprint.iacr.org/2010/204 [accessed on 19 Apr 2010].
  26. C. X. Zhou, W. Zhou and X.W. Dong, "Provable certificateless generalized signcryption scheme," Designs, Codes and Cryptography, vol. 71, no. 2, pp. 331-346, 2014. https://doi.org/10.1007/s10623-012-9734-y
  27. G. Wei, J. Shao, Y. Xiang, P. P. Zhu, and R. X. Lu, "Obtain confidentiality or/and authenticity in big data by id-based generalized signcryption," Information Sciences, vol. 318, pp. 111-122, 2015. https://doi.org/10.1016/j.ins.2014.05.034
  28. C. X. Zhou, "An improved multi-receiver generalized signcryption scheme," International Journal of Network Security, vol. 17, no. 3, pp. 340-350, 2015.
  29. Y. L. Han, Y. C. Bai, D. Y. Fang and X. Y. Yang, "The new attribute-based generalized signcryption scheme," in Proc. of ICYCSEE'2015, pp. 353-360, 2015.
  30. M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys," in Proc. of AsiaCrypt'2002, pp.415-432, Dec 1-5, 2002.
  31. J. Q. Lv and X. M. Wang, "Verifiable ring signature," in Proc. of DMS'2003, pp. 663-667, Sep, 2003.
  32. J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)," in Proc. of ACISP, pp. 325-335, Jul. 13-15, 2004.
  33. J. K. Liu and D. S.Wong, "On the security models of (Threshold) ring signature schemes," in Proc. of ICISC, pp. 204-217, Dec. 2-3, 2004.
  34. J. Herranz and G. Saez, "New identity-based ring signature schemes," in Proc. of ICICS'2004, pp. 27-39, Oct 27-29, 2004.
  35. A. Bender, J. Katz and R. Morselli, "Ring signatures: stronger definitions, and constructions without random oracles," in Proc. of TCC, pp. 60-79, Mar. 4-7, 2006.
  36. M. H. Au, J. K. Liu, W. Susilo and J. Y. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1909-1922, 2013. https://doi.org/10.1109/TIFS.2013.2282908
  37. L. Z. Deng, "Certificateless ring signature based on RSA problem and DL problem," RAIRO-Theoretical Informatics and Applications, vol. 49, no. 4, pp. 307-318, 2015. https://doi.org/10.1051/ita/2016013
  38. M. R. Asaar, M. Salmasizadeh andW. Susilo, "A short identity-based proxy ring signature scheme from RSA," Computer Standards & Interfaces, vol. 38, pp. 144-151, 2015. https://doi.org/10.1016/j.csi.2014.10.002
  39. M. H. Au and W. Susilo, "Two-party (blind) ring signatures and their applications," in Proc. of ISPEC, pp. 403-417, May 5-8, 2014.
  40. L. J. Zhu and F. T. Zhang, "Efficient id-based ring signature and ring signcryption schemes," in Proc. of CIS'2008, pp. 303-307, Dec 13-17, 2008.
  41. M. W. Zhang, B. Yang, S. L. Zhu and W. Z. Zhang, "Efficient secret authenticatable anonymous signcryption scheme with identity privacy," in Proc. of ISI 2008, pp.126-137, Jun. 17, 2008.
  42. F. G. Li, S. Masaaki and T. Tsuyoshi, "Analysis and improvement of authenticatable ring signcryption scheme," Journal of Shanghai Jiaotong University (Science), vol. 13, no. 6, pp. 679-683, 2008. https://doi.org/10.1007/s12204-008-0679-2
  43. J. H. Zhang, S. N. Gao, H. Chen and Q. Geng, "A novel ID-based anonymous signcryption scheme," in Proc. of APWeb/WAIM 2009, pp. 604-610, Apr 2-4, 2009.
  44. L. Z. Deng, J. W. Zeng and S. W. Li, "A new identity-based ring signcryption scheme," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 4, pp. 333-342, 2014. https://doi.org/10.1504/IJESDF.2014.065736
  45. H. Sun, "Efficient certificateless ring signcryption in the standard model," Journal of Computational Information Systems, vol. 10, no. 8, pp. 3181-3188, 2014.
  46. Z. Z. Guo, M. C. Li and X. X. Fan, "Attribute-based ring signcryption scheme," Security and Communication Networks, vol. 6, no. 6, pp. 790-796, 2013. https://doi.org/10.1002/sec.614
  47. L. Z. Deng, S. W. Li and Y. F. Yu, "Identity-based threshold ring signcryption from pairing," International Journal of Electronic Security and Digital Forensics, vol. 6, no. 2, pp. 90-103, 2014. https://doi.org/10.1504/IJESDF.2014.063093
  48. M. Barbosa and P. Farshim, "Certificateless signcryption," in Proc. of ASIACCS'2008, pp. 369-372, Mar 18-20, 2008.
  49. S. S. M. Chow, S. M. Yiu and L. C. K. Hui, "Efficient identity based ring signature," in Proc. of ACNS 2005, pp. 499-512, Jun 7-10, 2005.
  50. PBC library. http://crypto.stanford.edu/pbc.
  51. J. W. Liu, Z. H. Zhang, X. F. Chen and K. S. Kwak, "Certificateless remote anonymous authentication schemes for wireless body area networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332-342, 2014. https://doi.org/10.1109/TPDS.2013.145
  52. C. J. Wang and J. Liu, "Attribute-based ring signcryption scheme and its application in wireless body area networks," in Proc. of ICA3PP 2015, pp. 521-530, Nov 18-20, 2015.

Cited by

  1. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings vol.2017, pp.None, 2017, https://doi.org/10.1155/2017/8405879
  2. Certificate-Based Generalized Ring Signcryption Scheme vol.29, pp.6, 2018, https://doi.org/10.1142/s0129054118500211