test
server time: root: http://itiis.org
current_path: /journals/tiis/digital-library/20666
current_url: http://itiis.org/journals/tiis/digital-library/20666
A Fuzzy Identity-Based Signcryption Scheme from Lattices
  • KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Fuzzy Identity-Based Signcryption Scheme from Lattices

Vol. 8, No. 11, November 29, 2014
10.3837/tiis.2014.11.031, Download Paper (Free):

Abstract

Fuzzy identity-based cryptography introduces the threshold structure into identity-based cryptography, changes the receiver of a ciphertext from exact one to dynamic many, makes a cryptographic scheme more efficient and flexible. In this paper, we propose the first fuzzy identity-based signcryption scheme in lattice-based cryptography. Firstly, we give a fuzzy identity-based signcryption scheme that is indistinguishable against chosen plaintext attack under selective identity model. Then we apply Fujisaki-Okamoto method to obtain a fuzzy identity-based signcryption scheme that is indistinguishable against adaptive chosen ciphertext attack under selective identity model. Thirdly, we prove our scheme is existentially unforgeable against chosen message attack under selective identity model. As far as we know, our scheme is the first fuzzy identity-based signcryption scheme that is secure even in the quantum environment.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
X. Lu, Q. Wen, W. Li, L. Wang and H. Zhang, "A Fuzzy Identity-Based Signcryption Scheme from Lattices," KSII Transactions on Internet and Information Systems, vol. 8, no. 11, pp. 4203-4225, 2014. DOI: 10.3837/tiis.2014.11.031.

[ACM Style]
Xiuhua Lu, Qiaoyan Wen, Wenmin Li, Licheng Wang, and Hua Zhang. 2014. A Fuzzy Identity-Based Signcryption Scheme from Lattices. KSII Transactions on Internet and Information Systems, 8, 11, (2014), 4203-4225. DOI: 10.3837/tiis.2014.11.031.