Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

被引:0
作者
Chow, SSM [1 ]
Yiu, SM [1 ]
Hui, LCK [1 ]
Chow, KP [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci & Informat Syst, Hong Kong, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 | 2004年 / 2971卷
关键词
identity-based signcryption; forward security; public verifiability; provable security; semantical security; public ciphertext authenticity; network security; firewalls; public key cryptosystems; elliptic curve cryptosystems; cryptographic primitives;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boyen [7] gave the first identity-based (ID-based) signcryp-tion scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryp-tion scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 50 条
  • [31] An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability
    Hassan, Alzubair
    Hamza, Rafik
    Yan, Hongyang
    Li, Ping
    IEEE ACCESS, 2019, 7 (146322-146330) : 146322 - 146330
  • [32] Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
    Karati, Arijit
    Islam, S. K. Hafizul
    Biswas, G. P.
    Bhuiyan, Md Zakirul Alam
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2904 - 2914
  • [33] An ID-based proxy signature scheme secure against proxy key exposure
    Wen F.
    Cui S.
    Cui J.
    International Journal of Advancements in Computing Technology, 2011, 3 (05) : 108 - 116
  • [34] Provably secure public key cryptosystem based on chebyshev polynomials
    Yan, Shijie
    Zhen, Ping
    Min, Lequan
    Journal of Communications, 2015, 10 (06): : 380 - 384
  • [35] A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM
    Loh, Jia-Chng
    Guo, Fuchun
    Susilo, Willy
    Yang, Guomin
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 199 - 219
  • [36] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [37] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [38] Provably Secure Public-Key Steganography Based on Admissible Encoding
    Zhang, Xin
    Chen, Kejiang
    Zhao, Na
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3161 - 3175
  • [39] Forward-secure ciphertext-policy attribute-based encryption scheme
    State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University, Zhengzhou
    450001, China
    Wei, Jiang-Hong, 1600, Editorial Board of Journal on Communications (35): : 38 - 45
  • [40] Forward-secure ID based digital signature scheme with forward-secure private key generator
    Oh, Hyunok
    Kim, Jihye
    Shin, Ji Sun
    INFORMATION SCIENCES, 2018, 454 : 96 - 109