Robust ID-based threshold signcryption scheme from pairings

  • Shanshan Duan*
  • , Zhenfu Cao
  • , Rongxing Lu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

27 Scopus citations

Abstract

Recently bilinear pairings on elliptic curves have raised great interest in cryptographic community. Based on their good properties, many excellent ID-based cryptographic schemes have been proposed. However, in these proposed schemes, the private key generator should be assumed trusted, while in real environment, this assumption does not always hold. To overcome this weakness, in this paper, we will use the threshold technology to devise a secure ID-based signcryption scheme. Since the threshold technology is adopted not only in the master key management but also in the group signature, our scheme can achieve high security and resist some malicious attacks under a certain threshold.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Information Security, InfoSecu '04
Pages33-37
Number of pages5
DOIs
StatePublished - 2004
Externally publishedYes
Event3rd International Conference on Information Security, InfoSecu '04 - Shanghai, China
Duration: 14 Nov 200416 Nov 2004

Publication series

NameACM International Conference Proceeding Series
Volume85

Conference

Conference3rd International Conference on Information Security, InfoSecu '04
Country/TerritoryChina
CityShanghai
Period14/11/0416/11/04

Keywords

  • Bilinear pairings
  • Identity-based cryptography
  • Signcryption
  • Threshold scheme

Fingerprint

Dive into the research topics of 'Robust ID-based threshold signcryption scheme from pairings'. Together they form a unique fingerprint.

Cite this