Header menu link for other important links
X
An efficient identity-based signcryption scheme for multiple receivers
S. Sharmila Deva Selvi, Chandrasekharan Pandu Rangan
Published in
2009
Volume: 5824 LNCS
   
Pages: 71 - 88
Abstract
This paper puts forward a new efficient construction for Multi-Receiver Signcryption in the Identity-based setting. We consider a scenario where a user wants to securely send a message to a dynamically changing subset of the receivers in such a way that non-members of this subset cannot learn the message. One obvious solution is to signcrypt the message to each member of the subset and transmit it to each of them individually. This requires a very long transmission (the number of receivers times the length of the message) and high computation cost. Another simple solution is to provide a key for every possible subset of receivers. This requires every user to store a huge number of keys. In this case, the storage efficiency is compromised. The goal of this paper is to provide a solution which is efficient in all three measures i.e. transmission length, storage of keys and computation at both ends. We propose a new scheme that achieves both confidentiality and authenticity simultaneously in this setting and is the most efficient scheme to date, in the parameters described above. It breaks the barrier of ciphertext length of linear order in the number of receivers, and achieves constant sized ciphertext, independent of the size of the receiver set. This is the first Multi-receiver Signcryption scheme to do so. We support the scheme with security proofs in the random oracle model under precisely defined security model. © 2009 Springer-Verlag Berlin Heidelberg.
About the journal
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN03029743
Open AccessYes
Concepts (19)
  •  related image
    CIPHERTEXTS
  •  related image
    Computation costs
  •  related image
    Efficient construction
  •  related image
    IDENTITY BASED CRYPTOGRAPHY
  •  related image
    IDENTITY-BASED
  •  related image
    IDENTITY-BASED SIGNCRYPTION SCHEME
  •  related image
    LINEAR ORDER
  •  related image
    MULTI-RECEIVER
  •  related image
    Multiple receivers
  •  related image
    Provable security
  •  related image
    RANDOM ORACLE MODEL
  •  related image
    SECURITY MODEL
  •  related image
    SECURITY PROOFS
  •  related image
    Signcryption
  •  related image
    SIGNCRYPTION SCHEMES
  •  related image
    STORAGE EFFICIENCY
  •  related image
    Cryptography
  •  related image
    Set theory
  •  related image
    Security of data