Against the shortage of low efficiency of the existing threshold signcryption scheme and the key escrow in the id-based cryptosystem, a new identity-based (t, n) threshold signature encryption scheme is proposed from bilinear pairings. Our scheme can resist the private key generator to entrap through the introduction of secret information of the signcryptioner. Our scheme is more efficient and practical than the existing scheme.
1 Zheng Y. Digital signcryption or how to achieve cost(Signature&Encryption)<
2 Zheng Y. Signcryption and its applications in efficient public key solution. ISW’97. LNCS 1397, Springer-Verlag, 1998:291-312.
3 Shamir A. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto’84, LNCS 196, New York: Springer-Verlag, 1984. 47-53.
4 Duan S, Cao Z, Lu R. Robust ID-based threshold signcryption scheme from pairings. 3rd International Conference on Information Security. Shanghai, China, 2004. 33-37.
5 Li FG, Yu Y. Click on a pin to refine search results Reset Map Center and Zoom An efficient and Provably Secure IDBased Threshold Signcryption Scheme. 2008 International Conference on Communications, Circuits and Systems Proceedings ICCCAS 2008. Xiamen, Fujian Province, China, 2008. 488-492.
6 Selvi SS, Vivek SS, Rangan CP, Jain N. Cryptanalysis of Li et al.’s identity-based threshold signcryption scheme. Proc. of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Shanghai, China, 2008. 127-132.
7 Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology- Crypro’2001, Berlin: Springer-Verlag, 2001. 213-229.
8 Baek J, Zheng Y. Identity-based threshold signature scheme from the bilinear pairings. International Conference on Information Technology: Coding and Computing-ITCC’04, LasVegas. Nevada, USA, 2004. 124-128.