Robust ID-based threshold signcryption scheme from pairings

  • Shan Shan Duan*
  • , Zhen Fu Cao
  • , Rong Xing Lu
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Based on the good properties of bilinear pairings on elliptic curves, many good ID-based cryptographic schemes have been proposed. However, in these proposed schemes, the private key generator (PKG) should be assumed to be trusted, while in real environment, this assumption does not always hold. To overcome this weakness, the threshold technology was used to devise a secure ID-based signcryption scheme. Because the threshold technology is adopted not only in the master key management but also in the group signature, the scheme can achieve high security and resist some malicious attacks under a certain threshold.

Original languageEnglish
Pages (from-to)1946-1949
Number of pages4
JournalShanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University
Volume39
Issue number12
StatePublished - Dec 2005
Externally publishedYes

Keywords

  • Bilinear pairings
  • Identity-based cryptography
  • Signcryption
  • Threshold scheme

Fingerprint

Dive into the research topics of 'Robust ID-based threshold signcryption scheme from pairings'. Together they form a unique fingerprint.

Cite this