Cargando…

Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification

Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into acco...

Descripción completa

Detalles Bibliográficos
Autores principales: Pang, Liaojun, Li, Huixian, Gao, Lu, Wang, Yumin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2013
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3651172/
https://www.ncbi.nlm.nih.gov/pubmed/23675490
http://dx.doi.org/10.1371/journal.pone.0063562
_version_ 1782269176933515264
author Pang, Liaojun
Li, Huixian
Gao, Lu
Wang, Yumin
author_facet Pang, Liaojun
Li, Huixian
Gao, Lu
Wang, Yumin
author_sort Pang, Liaojun
collection PubMed
description Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer’s and the recipient’s anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer’s and the recipient’s anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. Key words: Multi-recipient signcryption; Signcryption; Complete Anonymity; Public verification.
format Online
Article
Text
id pubmed-3651172
institution National Center for Biotechnology Information
language English
publishDate 2013
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-36511722013-05-14 Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification Pang, Liaojun Li, Huixian Gao, Lu Wang, Yumin PLoS One Research Article Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer’s and the recipient’s anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer’s and the recipient’s anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. Key words: Multi-recipient signcryption; Signcryption; Complete Anonymity; Public verification. Public Library of Science 2013-05-10 /pmc/articles/PMC3651172/ /pubmed/23675490 http://dx.doi.org/10.1371/journal.pone.0063562 Text en © 2013 Pang et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited.
spellingShingle Research Article
Pang, Liaojun
Li, Huixian
Gao, Lu
Wang, Yumin
Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
title Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
title_full Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
title_fullStr Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
title_full_unstemmed Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
title_short Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
title_sort completely anonymous multi-recipient signcryption scheme with public verification
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3651172/
https://www.ncbi.nlm.nih.gov/pubmed/23675490
http://dx.doi.org/10.1371/journal.pone.0063562
work_keys_str_mv AT pangliaojun completelyanonymousmultirecipientsigncryptionschemewithpublicverification
AT lihuixian completelyanonymousmultirecipientsigncryptionschemewithpublicverification
AT gaolu completelyanonymousmultirecipientsigncryptionschemewithpublicverification
AT wangyumin completelyanonymousmultirecipientsigncryptionschemewithpublicverification