Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

被引:0
|
作者
Chow, SSM [1 ]
Yiu, SM [1 ]
Hui, LCK [1 ]
Chow, KP [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci & Informat Syst, Hong Kong, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 | 2004年 / 2971卷
关键词
identity-based signcryption; forward security; public verifiability; provable security; semantical security; public ciphertext authenticity; network security; firewalls; public key cryptosystems; elliptic curve cryptosystems; cryptographic primitives;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boyen [7] gave the first identity-based (ID-based) signcryp-tion scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryp-tion scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 50 条
  • [21] EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts
    Xu, Zhong
    Ma, Ruiping
    Liu, Shuai
    He, Wenbo
    AD HOC & SENSOR WIRELESS NETWORKS, 2011, 11 (1-2) : 93 - 110
  • [22] An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
    柴震川
    曹珍富
    陆荣幸
    Journal of Shanghai Jiaotong University(Science), 2006, (03) : 271 - 278
  • [23] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215): : 206 - 215
  • [24] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [25] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications
    Li, Fagen
    Xiong, Hu
    Nie, Xuyun
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300
  • [26] Secure and efficient multi-message and multi-receiver ID-based signcryption for rekeying in ad hoc networks
    邱婧
    BAI Jun
    SONG Xin-chuan
    HOU Su-mei
    Journal of Chongqing University(English Edition), 2013, 12 (02) : 91 - 96
  • [27] A provably secure, shortest, and efficient identity based signcryption technique in the standard model
    Aithekar, Ashutosh
    Gupta, Pratik
    Dharminder, Dharminder
    SECURITY AND PRIVACY, 2023, 6 (01)
  • [28] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
  • [29] Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting
    Odoom, Justice
    Huang, Xiaofang
    Wang, Licheng
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129
  • [30] Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability
    Han Yiliang
    Lu Wanyi
    Yang Xiaoyuan
    2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6373 - 6377