Font Size: a A A

Study On Identity-based Signcryption Schemes

Posted on:2013-01-28Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z H QiFull Text:PDF
GTID:1118330371957717Subject:Information security
Abstract/Summary:PDF Full Text Request
Information security which has become an important emerging discipline in the field of Information Science is one of the important problems need to be solved in information society. The cryptography technology as one of the core technology of information security plays an important role in information security. The idea of identity based cryptosystems is to get rid of public key certificates by allowing the user's public key to be an arbitrary string which is an information identifying him in a non ambiguous way (e-mail address, IP address, social security number, etc.). Identity-based signcryption scheme combining the added advantage that identity-based cryptosystems provides with digital signature, is to perform encryption and signature in a single logical step to obtain confidentiality, integrity, authentication and non-repudiation more efficiently than the sign-then-encrypt approach. Identity-based signcryption scheme using bilinear pairing on Elliptic Curves has the lower complexity and storage requirement relatively.In this thesis, we research identity-based signcryption scheme and its security. The main researches are as follows:It studies identity-based broadcast signcryption, and describes an identity-based broadcast signcryption scheme (IBSC) aiming to reduce the broadcast parameter of the algorithm and the computational cost. The experimental results show that the IBSC scheme, which security can be proved in the random oracle model of IND-CCA2 and EUF-CMA2 security formally, needs less time in signature and decryption processing than Selvi's scheme and can improve the efficiency of computation.It introduces identity-based multi-receiver signcryption, and an identity-based encryption algorithm is combined with a multi-receiver signature algorithm to form the identity-based multi-receiver signcryption scheme (IBMSC) under standard model. IBMRSC scheme, which is proven to be secure against adaptive chosen ciphertext attacks under decisional bilinear Diffie-Hellman assumption and adaptive chosen message attacks under computational Diffie-Hellman assumption respectively without random oracles, can efficiently improve the security of multi-receiver network, and is more efficient in reducing the computing consumption of bilinear pairing.It investigates identity-based ring signcryption, and proposes an identity-based ring signcryption scheme1 (IBRSC1) which security can be proved in the random oracle model of IND-CCA2 and EUF-CMA2 security formally, and an identity-based ring signcryption scheme2 (IBRSC2) under standard model which is proven to be secure against adaptive chosen ciphertext attacks and adaptive chosen message attacks under (ε, t)-Decisional Bilinear Diffie-Hellman assumption and (ε, t)-Computational Diffie-Hellman assumption respectively. In order to resolve the inherent key escrow problem in identity-based cryptography, this thesis proposes a novel certificateless ring signcryption scheme(CLRSC) from pairings, which is escrow free in that no key generation center (KGC) is able to decrypt ciphertext itself, and its IND-CCA2 and EUF-CMA2 security is proven formally in the random oracle model. In addition, an identity based ring signcryption scheme for multiple receivers (N-IBMRSC), which enable a user to send a message confidentially and authentically to multiple receivers in an anonymous way, is presented.The thesis also introduces identity based aggregate signcryption, and an identity based aggregate signcryption scheme (IBASC), which is useful for reducing the size of certi?cate chains (by aggregating all signatures in the chain) and for reducing message size in secure routing protocols, is presented.In order to improve the confidentiality of the private key generator (PKG) in Identity-Based Encryption-Signature (IBES) scheme, it mends Xavier IBES scheme, and uses (t, n) Secret sharing scheme of threshold cryptography to split the master secret s among n peer to peer third PKGs. It also evaluates the application the IBES scheme in wireless sensor network, and discusses its efficiency and security in terms of complexity, storage requirement and security. Analysis shows that our scheme can efficiently improve the confidentiality of the PKG and the security of wireless sensor network.Finally, in order to improve the security and efficiency performance of wireless sensor network signature-encryption, on the basis of attribute-based encryption (ABE) with the bilinear pairings on elliptic curves, an attribute-based encryption combined with identity-based signature (ABE-IBS) scheme is proposed. Besides, one efficient signature-encryption scheme for WSN is also discussed. Analysis and experimental results show that ABE-IBS scheme has the low complexity and storage requirement, and can enhance the security of wireless sensor network.
Keywords/Search Tags:identity-based cryptography, bilinear pairing, signcryption, attribute-based cryptography, network security, Wireless Sensor Network
PDF Full Text Request
Related items