Title: ID-based multi-receiver signcryption scheme in the standard model

Authors: Zhimin Yu; Zhengjun Jing; Hua Yang; Chunsheng Gu

Addresses: Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City, Jiangsu University of Technology, Changzhou Jiangsu 213001, China ' Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City, Jiangsu University of Technology, Changzhou Jiangsu 213001, China; College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China ' College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China ' Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City, Jiangsu University of Technology, Changzhou Jiangsu 213001, China; State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Abstract: Currently, the network multicast in network and internet services are widely used, and how to ensure secure data transmission and non-repudiation has been a hot issue. In order to ensure data confidentiality and non-repudiation in multicast that has lower cost of data transmission and computing, we propose an ID-based multi-receiver signcryption scheme in the standard model based on multilinear maps. In our construction, the number of recipients is unlimited and each receiver decrypts ciphertext using his private key and verifies the identity of the sender. At the same time, the identity-based design has important advantages in that it eliminates the large overhead of having to store and verify a set of verification keys. Based on the hardness assumption of the graded Diffie-Hellman problem, we prove that the proposed scheme can achieve the message confidentiality under selective multi-ID, chosen message attack and the signcryption is unforgeable under selective ID, chosen message attack.

Keywords: multilinear maps; ID-based signcryption; data confidentiality; unforgeability; network multicast; GDDH; identification; data security; cryptography; non-repudiation; standard model; ciphertext decryption; private key; identity verification; sender identity; chosen message attacks.

DOI: 10.1504/IJIPT.2017.083031

International Journal of Internet Protocol Technology, 2017 Vol.10 No.1, pp.4 - 12

Available online: 13 Mar 2017 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article