Identity-based threshold ring signcryption from pairing

This paper presents an identity-based threshold ring signcryption scheme. With this technique, any group of t entities can choose n - t entities to generate a t-out-of-n signcryption on behalf of the group of n members, yet the actual signcrypters remain anonymous. The scheme is proven to be indistinguishable against adaptive chosen ciphertext attacks, existentially unforgeable against adaptive chosen message and identity attacks, and unconditional signcrypter ambiguity under the random oracle model. To the best of authors' knowledge, the scheme is the first security ID-based threshold ring signcryption scheme.

[1]  Li Fa An Efficient Identity-Based Signcryption Scheme , 2006 .

[2]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[3]  Siu-Ming Yiu,et al.  Efficient Identity Based Ring Signature , 2005, ACNS.

[4]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[5]  Tsz Hon Yuen,et al.  Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant , 2006, 2006 International Conference on Computational Intelligence and Security.

[6]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[7]  Jacques Stern,et al.  Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.

[8]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[9]  Chih-Hung Wang,et al.  A new ring signature scheme with signer-admission property , 2007, Inf. Sci..

[10]  Yi Mu,et al.  Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[11]  Yuqing Zhang,et al.  An efficient and provable secure identity-based ring signcryption scheme , 2009, Comput. Stand. Interfaces.

[12]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[13]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[14]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[15]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Public Key Cryptography.

[16]  C. Pandu Rangan,et al.  On the Security of Identity Based Ring Signcryption Schemes , 2009, ISC.

[17]  Lijun Zhun,et al.  Efficient ID–Based Ring Signature and Ring Signcryption Schemes , 2008, 2008 International Conference on Computational Intelligence and Security.

[18]  Hovav Shacham,et al.  Efficient Ring Signatures Without Random Oracles , 2007, Public Key Cryptography.

[19]  C. Pandu Rangan,et al.  Identity Based Online/Offline Signcryption Scheme , 2010, IACR Cryptol. ePrint Arch..

[20]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[21]  Siu-Ming Yiu,et al.  Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..

[22]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.