Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
Formal Proofs for the Security of Signcryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Identity-based anonymous designated ring signatures
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Identity-based ring signatures from RSA
Theoretical Computer Science
Efficient identity based ring signature
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Blind spontaneous anonymous group signatures for ad hoc groups
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
On the Security of Identity Based Ring Signcryption Schemes
ISC '09 Proceedings of the 12th International Conference on Information Security
An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Hi-index | 0.00 |
ID-based ring signcryption schemes (IDRSC) are usually derived from bilinear parings, a powerful but computationally expensive primitive. The number of paring computations of all existing ID-based ring signcryption schemes from bilinear pairings grows linearly with group size, which makes the efficiency of ID-based schemes over traditional schemes questionable. This paper presents a new identity-based ring signcryption scheme, which only takes four pairing operations for any group size and the scheme is proven to be indistinguishable against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and existentially unforgeable against adaptive chosen message and identity attacks (EUF-IDRSC-ACMA) under the random oracle model.