{"title":"An Efficient Identity-Based Broadcast Signcryption Scheme","authors":"Dang Thu Hien, T. N. Tien, Truong Thi Thu Hien","doi":"10.1109/KSE.2010.17","DOIUrl":null,"url":null,"abstract":"It is a challenge to find out a suitable algorithm for broadcasting information securely and authentically to only target users. Many schemes based on public and symmetric key cryptography have been investigated. However, modeling an efficient scheme that provides both confidentiality and public cipher text authenticity is still an open problem. In this paper, we present an identity-based broadcast signcryption scheme with short cipher text size and public cipher text authenticity. The security of this scheme is proved under computational assumptions and in the random oracle model. Experimental results are also provided and compared with several schemes in both computation and communication cost.","PeriodicalId":158823,"journal":{"name":"2010 Second International Conference on Knowledge and Systems Engineering","volume":"2674 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Knowledge and Systems Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KSE.2010.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
It is a challenge to find out a suitable algorithm for broadcasting information securely and authentically to only target users. Many schemes based on public and symmetric key cryptography have been investigated. However, modeling an efficient scheme that provides both confidentiality and public cipher text authenticity is still an open problem. In this paper, we present an identity-based broadcast signcryption scheme with short cipher text size and public cipher text authenticity. The security of this scheme is proved under computational assumptions and in the random oracle model. Experimental results are also provided and compared with several schemes in both computation and communication cost.