Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security

被引:2
作者
LEI Feiyu CHEN Wen CHEN Kefei MA ChangsheDepartment of Computer Science and Engineering Shanghai Jiaotong University Shanghai China [200030 ]
机构
关键词
signcryption; identity based; public verifiability; forward security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
引用
收藏
页码:248 / 250
页数:3
相关论文
共 50 条
[21]   An Efficient Identity-Based Signcryption Scheme for Multiple Receivers [J].
Selvi, S. Sharmila Deva ;
Vivek, S. Sree ;
Srinivasan, Rahul ;
Rangan, Chandrasekaran Pandu .
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 :71-+
[22]   Identity-Based Digital Signature Scheme with Forward Security [J].
Tang Lei ;
Liu Yali .
PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, :290-293
[23]   A Public Verifiable Identity Based Signcryption in the Random Oracle Model [J].
陈雯 ;
潘峰 ;
郭放 ;
雷飞宇 .
JournalofDonghuaUniversity(EnglishEdition), 2009, 26 (04) :368-373
[24]   An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings [J].
Elkamchouchi, Hassan ;
Abou El-kheir, Eman ;
Abouelseoud, Yasmine .
2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, :80-85
[25]   Identity based signcryption scheme without random oracles [J].
Yu, Yong ;
Yang, Bo ;
Sun, Ying ;
Zhu, Sheng-lin .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) :56-62
[26]   Identity-based Group-recevier Signcryption scheme [J].
Zhang, Bo ;
Shan, Shan .
2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, :1986-+
[27]   Efficient secret authenticatable anonymous signcryption scheme with identity privacy [J].
Zhang, Mingwu ;
Yang, Bo ;
Zhu, Shenglin ;
Zhang, Wenzheng .
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 :126-+
[28]   Efficient Identity Based Multi-Proxy Multi-Signcryption Scheme Using Bilinear Pairings over Elliptic Curves [J].
Swapna, G. ;
Reddy, P. Vasudeva ;
Gowri, T. .
2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, :418-423
[29]   Efficient proxy signcryption scheme with provable CCA and CMA security [J].
Lin, Han-Yu ;
Wu, Tzong-Sun ;
Huang, Shih-Kun ;
Yeh, Yi-Shiung .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (07) :1850-1858
[30]   An Efficient and Secure Scheme for Smart Home Communication using Identity-Based Signcryption [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,