Skip to main content

An Identity-Based Ring Signcryption Scheme

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

Abstract

Signcryption enables a user to perform digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a cost lesser than sign-then- encrypt approach. As the concept of ring signcryption emerged, various practical applications like electronic transaction protocol and key management protocols, felt the requirement of signer’s privacy, which was lacking in normal signcryption schemes. Without revealing the users’ identity of the ring signcryption can provide confidentiality and authenticity both. In this paper, we present a new ID-based ring signcryption scheme, motivated to the scheme provided by Zhu et al. [1]. Selvi et al. [2] and Wang et al. [3] found some security flaws in the Zhu’s scheme [1], which is being considered and repaired in this paper. The proposed scheme is proven to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhu Z, Zhang Y, Wang F (2008) An efficient and provable secure identity based ring signcryption scheme. Computer standards & interfaces, pp 649–654

    Google Scholar 

  2. Selvi SSD, Vivek SS, Rangan CP (2009) On the security of identity based ring signcryption schemes. In: Proceedings of 12th International Conference on ISC 2009, Pisa, Italy, Sept 7–9, 2009, Proceedings of LNCS 5735, Springer, Berlin, pp 310–325

    Google Scholar 

  3. Wang H, Yu H (2008) Cryptanalysis of two ring signcryption schemes. In: Inscrypt 2008, LNCS-5487, Springer, Berlin, pp 41–46

    Google Scholar 

  4. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO ‘84, LNCS 196, Springer, Berlin, pp 47–53

    Google Scholar 

  5. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Proceedings of CRYPTO ‘01, LNCS 2139, Springer, Berlin, pp 213–229

    Google Scholar 

  6. Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Proceedings of advances in cryptology in asiacrypt 2001, LNCS 2248, Springer, Berlin, pp 552–565

    Google Scholar 

  7. Zheng F, Kim K (2002) Id-based blind signature and ring signature from pairings. In: Proceedings of Asiacrypt 02, LNCS 2501, Springer, Berlin, pp 533–547

    Google Scholar 

  8. Zheng Y (1997) Digital signcryption or how to achieve cost (signature and encryption) cost (signature) + cost(encryption)’. In: Proceedings of CRYPTO-97, pp 165–179

    Google Scholar 

  9. Baek J, Steinfeld R, Zheng Y (2002) Formal proofs for the security of signcryption. In: Proceedings of PKC—02, LNCS 2274, pp 81–98

    Google Scholar 

  10. Huang X, Susilo W, Mu Y, Zhang F (2005) Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In: Proceedings of AINA 05, Taipei, Taiwan, pp 649–654

    Google Scholar 

  11. Wang L, Zhang G, Ma C (2007) A secure ring signcryption scheme for private and anonymous communication. In: Proceedings of international conference NPC workshops, 2007

    Google Scholar 

  12. Zhu L, Zhang F (2008) Efficient identity based ring signature and ring signcryption schemes. In: Proceedings of international conference on CIS’08, vol 2, pp 303–307

    Google Scholar 

  13. Li F, Xiong H, Yu Y (2008) An efficient ID-based ring signcryption scheme. In: Proceedings of ICCCCAS 2008, Xiamen, pp 542–546

    Google Scholar 

  14. Yu Y, Li F, Xu C, Sun Y (2008) An efficient identity-based anonymous signcryption scheme. Wuhan Univ J Nat Sci 13(6):670–674

    Google Scholar 

  15. Zhang J, Gao S, Chen H, Geng Q (2009) A novel id-based anonymous signcryption scheme. In: Proceedings of APWeb/WAIM, LNCS 5446, Springer, Berlin, pp 604–610

    Google Scholar 

  16. Li F, Shirase M, Takagi T (2008) Analysis and improvement of authenticatable ring signcryption scheme. J Shanghai Jiaotong Univ (Sci) 13(6):679–683

    Google Scholar 

  17. Qi ZH, Yang G, Ren XY, Li YW (2010) An ID-based ring signcryption scheme for wireless sensor networks. In: Proceedings of IET International of Conference WSN, China, pp 368–373

    Google Scholar 

  18. Selvi SSD, Vivek SS, Rangan CP (2010) Identity based ring signcryption with public verifiability. In: Proceedings of SECRYPT—10, LNCS 2010

    Google Scholar 

  19. Zhang M, Zhong Y, Yang B, Zhang W (2009) Analysis and improvement of an id-based anonymous signcryption model. In: Proceedings of ICIC (1), LNCS 5754

    Google Scholar 

  20. Zhou J (2011) An efficient identity-based ring signcryption scheme without random oracles. In: Proceedings of international conference on computer and electrical engineering 4th (ICCEE—11), 2011

    Google Scholar 

  21. Huang XY, Zhang FT, Wu W (2006) Identity-based ring signcryption scheme. Proc Tien Tzu Hsueh Pao/Acta Electronica Sinica 34(2):263–266

    MathSciNet  Google Scholar 

  22. Malone-Lee J (2002) Identity based signcryption. J Cryptol 2002/098

    Google Scholar 

  23. Chow SSM, Yiu SM, Hui LCK (2005) Efficient identity based ring signature. In: Proceedings of ACNS 2005, LNCS 3531, Springer, Berlin, pp 499–512

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Sharma, G., Bala, S., Verma, A.K. (2013). An Identity-Based Ring Signcryption Scheme. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_18

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics