Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security

被引:2
|
作者
LEI Fei-yu
机构
关键词
signcryption; identity based; public verifiability; forward security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
引用
收藏
页码:248 / 250
页数:3
相关论文
共 50 条
  • [1] Efficient Identity Based Multi-Signcryption Scheme with Public Verifiability
    Swapna, G.
    Reddy, P. Vasudeva
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02) : 181 - 190
  • [2] AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Arland, Sakhi S.
    Rangan, C. Pandu
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 362 - 371
  • [3] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Ch, Shehzad Ashraf
    Uddin, Nizam
    Sher, Muhammad
    Ghani, Anwar
    Naqvi, Husnain
    Irshad, Azeem
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (05) : 1711 - 1723
  • [4] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Shehzad Ashraf Ch
    Nizam uddin
    Muhammad Sher
    Anwar Ghani
    Husnain Naqvi
    Azeem Irshad
    Multimedia Tools and Applications, 2015, 74 : 1711 - 1723
  • [5] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [6] Efficient short signcryption scheme with public verifiability
    Ma, Changshe
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 118 - 129
  • [7] A New Efficient Multiple Messages Signcryption Scheme with Public Verifiability
    Elkamchouchi, Hassan
    Nasr, Mohammed
    Ismail, Roayat
    APPLIED COMPUTING, COMPUTER SCIENCE, AND ADVANCED COMMUNICATION, PROCEEDINGS, 2009, 34 : 193 - +
  • [8] Study on Public Verifiability in Signcryption Scheme
    Zhou, Xuanwu
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 706 - 712
  • [9] Improved Signcryption Scheme with Public Verifiability
    Zhou, Xuanwu
    2009 PACIFIC-ASIA CONFERENCE ON KNOWLEDGE ENGINEERING AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, : 178 - 181
  • [10] Identity Based Public Verifiable Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    PROVABLE SECURITY, 2010, 6402 : 244 - 260