2012
DOI: 10.1002/sec.614
|View full text |Cite
|
Sign up to set email alerts
|

Attribute‐based ring signcryption scheme

Abstract: In this paper, we present attribute-based ring signcryption scheme, which realizes the concept of ring signcryption in the attribute-based encryption frame firstly. In our system, it allows a user to signcrypt a message by a set of attributes that are chosen without revealing its identity. In additional, we propose the security models and prove the confidentiality and unforgeability of our schemes. We also present the efficiency of our scheme by comparisons.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…The overhead is less than the combination of two steps (Signature + Encryption). Gagné et al proposed the first threshold policy attribute-based signcryption in [21] which is followed by a number of other schemes [22,23,24,25,26]. In [21] the signing attributes are separated from encryption/decryption attributes so that the signing and decryption rights can be separated.…”
Section: Related Workmentioning
confidence: 98%
“…The overhead is less than the combination of two steps (Signature + Encryption). Gagné et al proposed the first threshold policy attribute-based signcryption in [21] which is followed by a number of other schemes [22,23,24,25,26]. In [21] the signing attributes are separated from encryption/decryption attributes so that the signing and decryption rights can be separated.…”
Section: Related Workmentioning
confidence: 98%
“…To overcome this weakness, Qi et al [26] and Sharma et al [27] respectively gave a new identity-based ring signcryption scheme that only needs four pairing operations for any group size. In 2013, Guo et al [28] realized the ring signcryption in the attribute-based setting.…”
Section: Related Workmentioning
confidence: 99%
“…It protects the privacy of the sender since the receiver knows that the ciphertext comes from a member of a ring, but doesn't know exactly who the sender is. Some ring signcryption scheme have been proposed [24][25][26][27][28][29]. In 2008, Li et al [24] proposed a ring signcryption scheme with key privacy.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations