A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
The Weil Pairing, and Its Efficient Calculation
Journal of Cryptology
Identity-Based authenticated broadcast encryption and distributed authenticated encryption
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
An efficient identity-based cryptosystem for end-to-end mobile security
IEEE Transactions on Wireless Communications
Multicast group behavior in the Internet's multicast backbone (MBone)
IEEE Communications Magazine
Hi-index | 0.09 |
Efficient access control with scalable rekeying is one of the most important requirements for secure group communications, especially in a dynamic and large group. In a many-to-many group communication environment, sender authentication is also another important security requirement as each participant can potentially be both a sender and a receiver. In this study, we propose an authenticated group communication scheme which is secure against an adaptive chosen ciphertext attack using identity-based signcryption. The proposed scheme allows multiple senders to dynamically multicast messages into an arbitrary group of receivers determined by the senders. In the proposed scheme, the group member can be a stateless receiver. Data confidentiality of the group communication is guaranteed as well as the sender authentication.