Editorial Board

JMI2011A-3 Identity based ring signcryption schemes revisited (pp.33-46)

Author(s): S. Sharmila Deva Selvi, S. Sree Vivek and C. Pandu Rangan

J. Math-for-Ind. 3A (2011) 33-46.

Ring Signcryption is used to provide a graceful way to leak trustworthy secrets in an anonymous, authenticated and confidential way. To the best of our knowledge, seven identity based ring signcryption schemes were reported in the literature. In this paper, we show that five of them are insecure in one or the other way. We then propose a new scheme and formally prove its security properties. A comparison of our scheme with the only existing secure scheme by Huang et al. shows that our scheme is more efficient than the scheme by Huang et al.

Keyword(s).  Ring Signcryption, Cryptanalysis, Provable Security, Confidentiality, Chosen Plaintext Attack, Adaptive Chosen Ciphertext Attack, Bilinear Pairing, Random Oracle Model