Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security

被引:2
作者
LEI Feiyu CHEN Wen CHEN Kefei MA ChangsheDepartment of Computer Science and Engineering Shanghai Jiaotong University Shanghai China [200030 ]
机构
关键词
signcryption; identity based; public verifiability; forward security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
引用
收藏
页码:248 / 250
页数:3
相关论文
共 50 条
[41]   Breaking and Fixing of an Identity Based Multi-Signcryption Scheme [J].
Selvi, S. Sharmila Deva ;
Vivek, S. Sree ;
Rangan, C. Pandu .
PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 :61-75
[42]   Efficient Identity-Based Signcryption in the Standard Model [J].
Li, Fagen ;
Bin Muhaya, Fahad ;
Zhang, Mingwu ;
Takagi, Tsuyoshi .
PROVABLE SECURITY, 2011, 6980 :120-+
[43]   Efficient Certificateless Signcryption Scheme [J].
Yu, Gang ;
Yang, Hongzhi ;
Fan, Shuqin ;
YongShen ;
Han, Wenbao .
THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, :55-59
[44]   Provable security signcryption scheme based on RLWE without trapdoor [J].
Liu Z. ;
Han Y. ;
Yang X. ;
Liu S. .
Tongxin Xuebao/Journal on Communications, 2020, 41 (06) :14-25
[45]   A Fuzzy Identity-Based Signcryption Scheme from Lattices [J].
Lu, Xiuhua ;
Wen, Qiaoyan ;
Li, Wenmin ;
Wang, Licheng ;
Zhang, Hua .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11) :4203-4225
[46]   An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves [J].
Kumar, Manoj ;
Gupta, Pratik .
MATEMATIKA, 2019, 35 (01) :1-11
[47]   On the security of signcryption scheme with key privacy [J].
Tan, CH .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (04) :1093-1095
[48]   Efficient identity-based online/offline encryption and signcryption with short ciphertext [J].
Jianchang Lai ;
Yi Mu ;
Fuchun Guo .
International Journal of Information Security, 2017, 16 :299-311
[49]   Efficient identity-based online/offline encryption and signcryption with short ciphertext [J].
Lai, Jianchang ;
Mu, Yi ;
Guo, Fuchun .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (03) :299-311
[50]   An Efficient Identity-based Forward Secure Signature Scheme from Lattices [J].
Wu, Guang ;
Huang, Ruwei .
IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, :626-631