The Community for Technology Leaders
Circuits, Communications and Systems, Pacific-Asia Conference on (2009)
Chengdu, China
May 16, 2009 to May 17, 2009
ISBN: 978-0-7695-3614-9
pp: 415-418
Anonymous authentication is a means of authorizing a user without identification. The technology serves as a breakthrough to enhance the privacy of the user and yet preserve the security of the system. In this work, by combining ring signature with ID-based signcryption scheme, we build a security model of anonymous signcryption and have proposed an ID-based anonymous signcryption scheme based on the bilinear pairings to adapt to the anonymous setting. And we prove that our proposed scheme is secure and satisfies the confidentiality and unforgeability. And only one pairing operator and two pairing operators are required in the signcryption phase and verifying phase, respectively.
anonymous signcryption; ID-based; pairings; security proof

J. Zhang and H. Chen, "Efficient Provable Secure ID-Based Anonymous Signcryption Scheme," 2009 Pacific-Asia Conference on Circuits, Communications and Systems (PACCS 2009)(PACCS), Chengdu, 2009, pp. 415-418.
88 ms
(Ver 3.3 (11022016))