An efficient multi-recipient signcryption scheme for multi-user communication

The traditional methods are not efficient in transmitting messages to multiple users. To address the efficiency and security problems, this paper constructed a new multi-recipient signcryption scheme, which employed the randomness reusing and is proved to be semantic secure under the random oracle model and GDH assumption. It is showed that it has the lower overheads than other existed schemes. The totally cipher text and computational cost of the proposal is (n+1)/2n times than traditional methods'. It is an ideal resolution for wireless networks.

[1]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[2]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[3]  Jean-Jacques Quisquater,et al.  Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups , 2004, Public Key Cryptography.

[4]  Xiaotie Deng,et al.  Analysis and Improvement of a Signcryption Scheme with Key Privacy , 2005, ISC.

[5]  Chik How Tan Analysis of improved signcryption scheme with key privacy , 2006, Inf. Process. Lett..

[6]  Yiliang Han,et al.  Adaptive secure multicast in wireless networks , 2009, Int. J. Commun. Syst..

[7]  Xu Ming,et al.  A Survey of Research on Key Management for Multicast , 2004 .

[8]  Kyung-Ah Shim,et al.  New DSA-Verifiable Signcryption Schemes , 2002, ICISC.

[9]  Yiliang Han Generalization of signcryption for resources-constrained environments , 2007, Wirel. Commun. Mob. Comput..

[10]  Wang Shuang-jin Identity-based Broadcast Signcryption with Proxy Re-signature , 2013 .

[11]  Chik How Tan On the Security of Signcryption Scheme with Key Privacy , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Wenbo Mao,et al.  Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.

[13]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[14]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[15]  Han Yi New ECDSA-Verifiable Generalized Signcryption , 2006 .

[16]  Zhenfu Cao,et al.  Efficient and Provably Secure Multi-receiver Identity-Based Signcryption , 2006, ACISP.

[17]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[18]  Mingwu Zhang,et al.  Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2007, ATC.