Cryptology ePrint Archive: Report 2008/341
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Pandu Rangan Chandrasekaran
Abstract: This paper puts forward a new efficient construction for Multi-Receiver Signcryption
in the Identity-based setting. We consider a scenario where a user wants to securely send a message
to a dynamically changing subset of the receivers in such a way that non-members of the of this
subset cannot learn the message. The obvious solution is to transmit an individually signcrypted
message to every member of the subset. This requires a very long transmission (the number of
receivers times the length of the message) and high computation cost. Another simple solution
is to provide every possible subset of receivers with a key. This requires every user to store a
huge number of keys. In this case, the storage efficiency is compromised. The goal of this paper
is to provide solutions which are efficient in all three measures i.e. transmission length, storage of
keys and computation at both ends. We propose a new scheme that achieve both confidentiality
and authenticity simultaneously in this setting and is the most efficient scheme to date, in the
parameters described above. It breaks the barrier of ciphertext length of linear order in the number
of receivers, and achieves constant sized ciphertext, independent of the size of the receiver set. This
is the first Multi-receiver Signcryption scheme to do so. We support the scheme with security proofs
under a precisely defined formal security model
Category / Keywords: public-key cryptography / Multiple Receivers, Signcryption, Identity-Based Cryptography, Provable Security, Bilinear Pairing
Date: received 4 Aug 2008, last revised 16 Apr 2009
Contact author: prangan55 at gmail com
Available format(s): PDF | BibTeX Citation
Note: A few minor errors present in the previous version have been corrected and the proofs have been expanded.
Version: 20090416:163756 (All versions of this report)
Short URL: ia.cr/2008/341
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]