Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

被引:0
|
作者
Chow, SSM [1 ]
Yiu, SM [1 ]
Hui, LCK [1 ]
Chow, KP [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci & Informat Syst, Hong Kong, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 | 2004年 / 2971卷
关键词
identity-based signcryption; forward security; public verifiability; provable security; semantical security; public ciphertext authenticity; network security; firewalls; public key cryptosystems; elliptic curve cryptosystems; cryptographic primitives;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boyen [7] gave the first identity-based (ID-based) signcryp-tion scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryp-tion scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 50 条
  • [2] Efficient short signcryption scheme with public verifiability
    Ma, Changshe
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 118 - 129
  • [3] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Ch, Shehzad Ashraf
    Uddin, Nizam
    Sher, Muhammad
    Ghani, Anwar
    Naqvi, Husnain
    Irshad, Azeem
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (05) : 1711 - 1723
  • [4] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Shehzad Ashraf Ch
    Nizam uddin
    Muhammad Sher
    Anwar Ghani
    Husnain Naqvi
    Azeem Irshad
    Multimedia Tools and Applications, 2015, 74 : 1711 - 1723
  • [5] Efficient Identity Based Multi-Signcryption Scheme with Public Verifiability
    Swapna, G.
    Reddy, P. Vasudeva
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02): : 181 - 190
  • [6] Study on Public Verifiability in Signcryption Scheme
    Zhou, Xuanwu
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 706 - 712
  • [7] A New Efficient Multiple Messages Signcryption Scheme with Public Verifiability
    Elkamchouchi, Hassan
    Nasr, Mohammed
    Ismail, Roayat
    APPLIED COMPUTING, COMPUTER SCIENCE, AND ADVANCED COMMUNICATION, PROCEEDINGS, 2009, 34 : 193 - +
  • [8] AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Arland, Sakhi S.
    Rangan, C. Pandu
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 362 - 371
  • [9] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
    Zhang, Bo
    Xu, Qiuliang
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
  • [10] Tight chosen ciphertext attack(CCA)-secure hybrid encryption scheme with full public verifiability
    KANG Li
    TANG XiaoHu
    LIU JiaFen
    Science China(Information Sciences), 2014, 57 (11) : 162 - 175