Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security

被引:2
作者
LEI Feiyu CHEN Wen CHEN Kefei MA ChangsheDepartment of Computer Science and Engineering Shanghai Jiaotong University Shanghai China [200030 ]
机构
关键词
signcryption; identity based; public verifiability; forward security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
引用
收藏
页码:248 / 250
页数:3
相关论文
共 50 条
[31]   Efficient and identity-based signcryption with provably-secure [J].
Wen Y. ;
Ma J. ;
Moon S. .
International Journal of Digital Content Technology and its Applications, 2010, 4 (07) :148-153
[32]   On security of a certificateless signcryption scheme [J].
Miao, Songqin ;
Zhang, Futai ;
Li, Sujuan ;
Mu, Yi .
INFORMATION SCIENCES, 2013, 232 :475-481
[33]   Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability [J].
Han Yiliang ;
Lu Wanyi ;
Yang Xiaoyuan .
2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, :6373-6377
[34]   Efficient Public Verifiability and Data Dynamics for Storage Security in Hybrid Clouds [J].
Aman, Amish Kumar ;
Prakash, Vijay .
2013 4TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT), 2013, :28-33
[35]   An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability [J].
Hassan, Alzubair ;
Hamza, Rafik ;
Yan, Hongyang ;
Li, Ping .
IEEE ACCESS, 2019, 7 (146322-146330) :146322-146330
[36]   Efficient distributed signcryption scheme as group signcryption [J].
Kwak, DJ ;
Moon, SJ .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 :403-417
[37]   Multi-receiver Identity-Based Signcryption Scheme in the Standard Model [J].
Ming, Yang ;
Zhao, Xiangmo ;
Wang, Yumin .
INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 :487-+
[38]   Identity-based multi-signcryption scheme without random oracles [J].
Zhang B. ;
Xu Q.-L. .
Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01) :103-110
[39]   An Efficient Lattice-Based Encrypted Search Scheme with Forward Security [J].
Yu, Xiaoling ;
Xu, Lei ;
Huang, Xin ;
Xu, Chungen .
NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 :712-726
[40]   An Efficient Identity-based Signcryption from Lattice [J].
Zhao, Xiufeng ;
Wang, Xiang .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02) :363-374