Multi-recipient signcryption for secure group communication

When a sender sends multiple messages to multiple recipients, overheads can be reduced efficiently by multi-recipient signcryption schemes. We proposed two multi-recipient signcryption schemes. The first scheme called SM-MR SCS (Single Message - Multiple Receivers SignCryption Scheme), which is an efficient broadcast signcryption scheme. The second scheme called MM-MR SCS (Multiple Messages - Multiple Receivers SignCryption Scheme) can send the distinct message to different recipients simultaneously. The proposed schemes keep the same security level as SCS due to its reproducibility. Compared with traditional methods, overheads of the new schemes are reduced sharply. They are more efficient than other known schemes when a sender sends different messages to distinct recipients.

[1]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[2]  Robert H. Deng,et al.  A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.

[3]  Kyung-Ah Shim,et al.  New DSA-Verifiable Signcryption Schemes , 2002, ICISC.

[4]  Kaoru Kurosawa,et al.  Multi-recipient Public-Key Encryption with Shortened Ciphertext , 2002, Public Key Cryptography.

[5]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[6]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[7]  Wenbo Mao,et al.  Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.

[8]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[9]  Han Yi New ECDSA-Verifiable Generalized Signcryption , 2006 .

[10]  Zhenfu Cao,et al.  Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.

[11]  Yiliang Han Generalization of signcryption for resources-constrained environments , 2007, Wirel. Commun. Mob. Comput..

[12]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[13]  Mihir Bellare,et al.  Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security , 2007, IEEE Transactions on Information Theory.

[14]  Xu An Wang,et al.  Multi-Recipient Signcryption for Secure Wireless Group Communication , 2008, IACR Cryptol. ePrint Arch..

[15]  C. Pandu Rangan,et al.  An Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2009, IWSEC.

[16]  Fagen Li,et al.  Indentity-based broadcast signcryption , 2008, Comput. Stand. Interfaces.