Cryptology ePrint Archive: Report 2008/341

An Efficient Identity-Based Signcryption Scheme for Multiple Receivers

S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Pandu Rangan Chandrasekaran

Abstract: This paper puts forward a new efficient construction for Multi-Receiver Signcryption in the Identity-based setting. We consider a scenario where a user wants to securely send a message to a dynamically changing subset of the receivers in such a way that non-members of the of this subset cannot learn the message. The obvious solution is to transmit an individually signcrypted message to every member of the subset. This requires a very long transmission (the number of receivers times the length of the message) and high computation cost. Another simple solution is to provide every possible subset of receivers with a key. This requires every user to store a huge number of keys. In this case, the storage efficiency is compromised. The goal of this paper is to provide solutions which are efficient in all three measures i.e. transmission length, storage of keys and computation at both ends. We propose a new scheme that achieve both confidentiality and authenticity simultaneously in this setting and is the most efficient scheme to date, in the parameters described above. It breaks the barrier of ciphertext length of linear order in the number of receivers, and achieves constant sized ciphertext, independent of the size of the receiver set. This is the first Multi-receiver Signcryption scheme to do so. We support the scheme with security proofs under a precisely defined formal security model

Category / Keywords: public-key cryptography / Multiple Receivers, Signcryption, Identity-Based Cryptography, Provable Security, Bilinear Pairing

Date: received 4 Aug 2008, last revised 16 Apr 2009

Contact author: prangan55 at gmail com

Available format(s): PDF | BibTeX Citation

Note: A few minor errors present in the previous version have been corrected and the proofs have been expanded.

Version: 20090416:163756 (All versions of this report)

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]