Identity Based Public Verifiable Signcryption Scheme

被引:0
作者
Selvi, S. Sharmila Deva [1 ]
Vivek, S. Sree [1 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol Madras, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
来源
PROVABLE SECURITY | 2010年 / 6402卷
关键词
Signcryption; Public verifiable Signcryption; Cryptanalysis; Identity Based; Bilinear Pairing; Random Oracle Model; AUTHENTICATION; EFFICIENT;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Signcryption as a cryptographic primitive that offers both confidentiality and authentication simultaneously. Generally, in signcryption schemes, the message is hidden and thus the validity of the signcryption can be verified only after the unsigncryption process. Thus, a third party will not be able to verify whether the signcryption is valid or not. Signcryption schemes that allow any one to verify the validity of signcryption without the knowledge of the message are called public verifiable signcryption schemes. Third party verifiable signcryption schemes allow the receiver of a signcryption, to convince a third party that the signcryption is valid, by providing some additional information along with the signcryption. This information can be anything other than the receiver's private key and the verification may or may not require the exposure of the corresponding message. This paper shows the security weaknesses in two such existing schemes namely [14] and [4]. The scheme in [14] is Public Key Infrastructure (PKI) based scheme and the scheme in [4] is an identity based scheme. More specifically, [14] is based on elliptic curve digital signature algorithm (ECDSA). We also, provide a new identity based signcryption scheme that provides both public verifiability and third party verification. We formally prove the security of the newly proposed scheme in the random oracle model.
引用
收藏
页码:244 / 260
页数:17
相关论文
共 17 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], LNCS
[3]  
[Anonymous], 1998, LECT NOTES COMPUTER
[4]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[5]  
Chow SSM, 2004, LECT NOTES COMPUT SC, V2971, P352
[6]  
Dae Hyun Yum, 2002, Information Security and Cryptology - ICISC 2001. 4th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2288), P305
[7]  
Gamage C, 1999, LECT NOTES COMPUT SC, V1560, P69
[8]  
Libert B, 2004, LECT NOTES COMPUT SC, V2947, P187
[9]   A new identity based signcryption scheme from pairings [J].
Libert, B ;
Quisquater, JJ .
2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, 2003, :155-158
[10]  
Malone-Lee John., 2002, Report 2002/098