An Improved Identity-Based Ring Signcryption Scheme

ABSTRACT In this paper, we show that the identity-based ring signcryption scheme suggested by Zhu, Zhang, and Wang (2009) does not reach the security as they claimed it does. To make up for this defect, we propose a rescue scheme and prove the revised scheme is secure under the random oracle model.

[1]  Gaurav Sharma,et al.  An Identity-Based Ring Signcryption Scheme , 2013, ICITCS.

[2]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[3]  Jacques Stern,et al.  Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.

[4]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[5]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[6]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[7]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[8]  Yi Mu,et al.  Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[9]  Yuqing Zhang,et al.  An efficient and provable secure identity-based ring signcryption scheme , 2009, Comput. Stand. Interfaces.

[10]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[13]  Hovav Shacham,et al.  Efficient Ring Signatures Without Random Oracles , 2007, Public Key Cryptography.

[14]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[15]  DU Hong-zhen Identity-based ring signcryption scheme , 2009 .

[16]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[17]  Siu-Ming Yiu,et al.  Efficient Identity Based Ring Signature , 2005, ACNS.

[18]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[19]  Xinmiao Zhang,et al.  Wireless Security and Cryptography: Specifications and Implementations , 2007 .

[20]  Nicolas Sklavos On the Hardware Implementation Cost of Crypto-Processors Architectures , 2010, Inf. Secur. J. A Glob. Perspect..