AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY

S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan

2010

Abstract

Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. Ring signcryption enables a user to anonymously signcrypt a message on behalf of a set of users including himself. Thus a ring signcrypted message has anonymity in addition to authentication and confidentiality. Ring signcryption schemes have no centralized coordination: any user can choose a ring of users, that includes himself and signcrypt any message without any assistance from the other group members. Ring Signcryption is useful for leaking trustworthy secrets in an anonymous, authenticated and confidential way. To the best of our knowledge, ten identity based ring signcryption schemes are reported in the literature. Three of them were proved to be insecure in (Li et al., 2008a), (Zhang et al., 2009a) and (Vivek et al., 2009). Four of them were proved to be insecure in (Selvi et al., 2009). In this paper, we show that one among the remaining three schemes, (Zhang et al., 2009b) is not secure against confidentiality, existential unforgeability and anonymity attacks. We propose a new anonymous ring signcryption scheme which is an extension to (Selvi et al., 2009) and give formal security proofs for our system in the random oracle model. Our scheme is publicly verifiable which none of the existing unbroken schemes can achieve.

References

  1. Baek, J., Steinfeld, R., and Zheng, Y. (2002). Formal proofs for the security of signcryption. In PKC 2002: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag.
  2. Chow, S. S. M., Yiu, S.-M., and Hui, L. C. K. (2005). Efficient identity based ring signature. In ACNS, volume 3531, pages 499-512.
  3. Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In AINA 7805: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pages 649-654. IEEE Computer Society.
  4. Li, F., Shirase, M., and Takagi, T. (2008a). Analysis and improvement of authenticatable ring signcryption scheme. In International Conference ProvSec-08, Paper appears in Journal of Shanghai Jiaotong University (Science), volume 13-6, pages 679-683.
  5. Li, F., Xiong, H., and Yu, Y. (2008b). An efficient id-based ring signcryption scheme. In International Conference on Communications, Circuits and Systems, 2008. ICCCAS 2008., pages 483-487.
  6. Malone-lee, J. (2002). Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098.
  7. Selvi, S. S. D., Vivek, S. S., and Rangan, C. P. (2009). On the security of identity based ring signcryption schemes. In ISC, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, volume 5735 of Lecture Notes in Computer Science, pages 310-325. Springer.
  8. Vivek, S. S., Selvi, S. S. D., and Rangan, C. P. (2009). On the security of two ring signcryption schemes. In SECRYPT 2009, pages 219-224. INSTICC Press.
  9. Yu, Y., Li, F., Xu, C., and Sun, Y. (2008). An efficient identity-based anonymous signcryption scheme. Wuhan University Journal of Natural Sciences, Volume: 13, Number: 6, December, 2008:670-674.
  10. Zhang, J., Gao, S., Chen, H., and Geng, Q. (2009a). A novel id-based anonymous signcryption scheme. In APWeb/WAIM, volume 5446 of Lecture Notes in Computer Science, pages 604-610. Springer.
  11. Zhang, M., Yang, B., Zhu, S., and Zhang, W. (2008). Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In PAISI, PACCF and SOCO 7808: Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, pages 126-137. Springer-Verlag.
  12. Zhang, M., Zhong, Y., Yang, B., and Zhang, W. (2009b). Analysis and improvement of an id-based anonymous signcryption model. In ICIC (1), volume 5754 of Lecture Notes in Computer Science, pages 433-442. Springer.
  13. Zhu, Z., Zhang, Y., and Wang, F. (Pages 649-654, http://dx.doi.org/10.1016/j.csi.2008.09.023, 2008). An efficient and provable secure identity based ring signcryption scheme. In Computer Standards & Interfaces.
  14. Zhun, L. and Zhang, F. (2008). Efficient identity based ring signature and ring signcryption schemes. In International Conference on Computational Intelligence and Security, 2008. CIS 7808., volume 2, pages 303-307.
Download


Paper Citation


in Harvard Style

Sharmila Deva Selvi S., Sree Vivek S., S. Anand S. and Pandu Rangan C. (2010). AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 362-371. DOI: 10.5220/0002981203620371


in Bibtex Style

@conference{secrypt10,
author={S. Sharmila Deva Selvi and S. Sree Vivek and Sakhi S. Anand and C. Pandu Rangan},
title={AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={362-371},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002981203620371},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY
SN - 978-989-8425-18-8
AU - Sharmila Deva Selvi S.
AU - Sree Vivek S.
AU - S. Anand S.
AU - Pandu Rangan C.
PY - 2010
SP - 362
EP - 371
DO - 10.5220/0002981203620371