{"title":"基于id的签名加密和限制反签名加密","authors":"Fei Tang, Changlu Lin, Hongda Li","doi":"10.1109/INCoS.2013.90","DOIUrl":null,"url":null,"abstract":"We introduce a novel cryptographic primitive, the Signcryption with Restrictive Unsigncryption (SRU), which means that the sender sign crypts a message and sends the cipher text to a receiver, however, the sender embeds some restrictive conditions into this cipher text. Hence the receiver cannot completely unsigncrypt the cipher text and obtain the original message unless the cipher text is authorized by a third party who is appointed by the sender. Based on this property, the SRU scheme can be applied to many scenarios, such as, digital will, scheduled payment, sealed-bid auction, and so on. We present the formal definitions and security models for the SRU scheme in the identity-based setting, and also construct a concrete ID-SRU scheme using bilinear pairings. Our proposed scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman (BDH) assumption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"ID-Based Signcryption with Restrictive Unsigncryption\",\"authors\":\"Fei Tang, Changlu Lin, Hongda Li\",\"doi\":\"10.1109/INCoS.2013.90\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We introduce a novel cryptographic primitive, the Signcryption with Restrictive Unsigncryption (SRU), which means that the sender sign crypts a message and sends the cipher text to a receiver, however, the sender embeds some restrictive conditions into this cipher text. Hence the receiver cannot completely unsigncrypt the cipher text and obtain the original message unless the cipher text is authorized by a third party who is appointed by the sender. Based on this property, the SRU scheme can be applied to many scenarios, such as, digital will, scheduled payment, sealed-bid auction, and so on. We present the formal definitions and security models for the SRU scheme in the identity-based setting, and also construct a concrete ID-SRU scheme using bilinear pairings. Our proposed scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman (BDH) assumption.\",\"PeriodicalId\":353706,\"journal\":{\"name\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCoS.2013.90\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ID-Based Signcryption with Restrictive Unsigncryption
We introduce a novel cryptographic primitive, the Signcryption with Restrictive Unsigncryption (SRU), which means that the sender sign crypts a message and sends the cipher text to a receiver, however, the sender embeds some restrictive conditions into this cipher text. Hence the receiver cannot completely unsigncrypt the cipher text and obtain the original message unless the cipher text is authorized by a third party who is appointed by the sender. Based on this property, the SRU scheme can be applied to many scenarios, such as, digital will, scheduled payment, sealed-bid auction, and so on. We present the formal definitions and security models for the SRU scheme in the identity-based setting, and also construct a concrete ID-SRU scheme using bilinear pairings. Our proposed scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman (BDH) assumption.