×

Identity based ring signcryption schemes revisited. (English) Zbl 1260.94055

Summary: Ring signcryption is used to provide a graceful way to leak trustworthy secrets in an anonymous, authenticated and confidential way. To the best of our knowledge, seven identity-based ring signcryption schemes were reported in the literature. In this paper, we show that five of them are insecure in one or the other way. We then propose a new scheme and formally prove its security properties. A comparison of our scheme with the only existing secure scheme by X. Huang et al. [“Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world.” AINA 2005, Los Alamitos: IEEE Computer Society, 649–654 (2005)] shows that our scheme is more efficient than the scheme by Huang et al. (loc. cit.).

MSC:

94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
PDFBibTeX XMLCite
Full Text: Link