Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification

Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer’s and the recipient’s anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer’s and the recipient’s anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. Key words: Multi-recipient signcryption; Signcryption; Complete Anonymity; Public verification.

[1]  Bo Zhang,et al.  An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model , 2010, AST/UCMA/ISA/ACN.

[2]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[3]  C. Pandu Rangan,et al.  An Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2009, IWSEC.

[4]  Jianhong Zhang,et al.  A Novel ID-Based Anonymous Signcryption Scheme , 2009, APWeb/WAIM.

[5]  Yi Mu,et al.  Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[6]  Joonsang Baek,et al.  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.

[7]  Einar Snekkenes,et al.  Robustness of Biometric Gait Authentication Against Impersonation Attack , 2006, OTM Workshops.

[8]  Huawang Qin,et al.  Identity-based multi-receiver threshold signcryption scheme , 2011, Secur. Commun. Networks.

[9]  Pang Liao A New Multi-Receiver ID-Based Anonymous Signcryption , 2011 .

[10]  Chun-I Fan,et al.  Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.

[11]  Licheng Jiao,et al.  Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme: Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme , 2009 .

[12]  Liaojun Pang,et al.  Improved multicast key management of Chinese wireless local area network security standard , 2012, IET Commun..

[13]  Xiaohui Wang,et al.  Efficient ID-based Secure Encryption Scheme for Anonymous Receivers , 2009, J. Networks.

[14]  Yasmine Abouelseoud,et al.  MIDSCYK: An efficient provably secure multi-recipient identity-based signcryption scheme , 2009, 2009 International Conference on Networking and Media Convergence.

[15]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2006, Essays in Memory of Shimon Even.

[16]  Jiao Licheng,et al.  Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme , 2009 .

[17]  Sunder Lal,et al.  Anonymous ID Based Signcryption Scheme for Multiple Receivers , 2009, IACR Cryptol. ePrint Arch..

[18]  Zhenfu Cao,et al.  Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.

[19]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[20]  Xie Qi,et al.  A new (t, n) threshold signature scheme withstanding the conspiracy attack , 2008, Wuhan University Journal of Natural Sciences.