Cargando…
Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification
Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into acco...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2013
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3651172/ https://www.ncbi.nlm.nih.gov/pubmed/23675490 http://dx.doi.org/10.1371/journal.pone.0063562 |
_version_ | 1782269176933515264 |
---|---|
author | Pang, Liaojun Li, Huixian Gao, Lu Wang, Yumin |
author_facet | Pang, Liaojun Li, Huixian Gao, Lu Wang, Yumin |
author_sort | Pang, Liaojun |
collection | PubMed |
description | Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer’s and the recipient’s anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer’s and the recipient’s anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. Key words: Multi-recipient signcryption; Signcryption; Complete Anonymity; Public verification. |
format | Online Article Text |
id | pubmed-3651172 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2013 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-36511722013-05-14 Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification Pang, Liaojun Li, Huixian Gao, Lu Wang, Yumin PLoS One Research Article Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer’s anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer’s and the recipient’s anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer’s and the recipient’s anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant. Key words: Multi-recipient signcryption; Signcryption; Complete Anonymity; Public verification. Public Library of Science 2013-05-10 /pmc/articles/PMC3651172/ /pubmed/23675490 http://dx.doi.org/10.1371/journal.pone.0063562 Text en © 2013 Pang et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited. |
spellingShingle | Research Article Pang, Liaojun Li, Huixian Gao, Lu Wang, Yumin Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification |
title | Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification |
title_full | Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification |
title_fullStr | Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification |
title_full_unstemmed | Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification |
title_short | Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification |
title_sort | completely anonymous multi-recipient signcryption scheme with public verification |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3651172/ https://www.ncbi.nlm.nih.gov/pubmed/23675490 http://dx.doi.org/10.1371/journal.pone.0063562 |
work_keys_str_mv | AT pangliaojun completelyanonymousmultirecipientsigncryptionschemewithpublicverification AT lihuixian completelyanonymousmultirecipientsigncryptionschemewithpublicverification AT gaolu completelyanonymousmultirecipientsigncryptionschemewithpublicverification AT wangyumin completelyanonymousmultirecipientsigncryptionschemewithpublicverification |