Provably Secure Self-Certified Signature Schemes with Message Recovery

被引:0
|
作者
Zhang Shengyuan [1 ]
Tang Fei [1 ]
Lin Changlu [1 ]
Ke Pinhui [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350108, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; self-certified public key; message recovery; random oracle model; DIGITAL SIGNATURE; PUBLIC KEYS; CRYPTANALYSIS; EFFICIENT;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problem. This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated receiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes.
引用
收藏
页码:112 / 119
页数:8
相关论文
共 50 条
  • [21] Digital signature with message recovery using self-certified public keys without trustworthy system authority
    Chang, YF
    Chang, CC
    Huang, HF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (01) : 211 - 227
  • [22] Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks
    Yulei Chen
    Jianhua Chen
    Multimedia Tools and Applications, 2021, 80 : 15291 - 15313
  • [23] Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (10) : 15291 - 15313
  • [24] Improvement of efficient proxy signature schemes using self-certified public keys
    Shao, ZH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 222 - 234
  • [25] An improved digital signature with message recovery using self-certified public keys without trustworthy system authority
    Yoon, EJ
    Yoo, KY
    SOFSEM 2006: THEORY AND PRACTICE OF COMPUTER SCIENCE, PROCEEDINGS, 2006, 3831 : 548 - 555
  • [26] Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    Tsai, Pei-Ling
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 914 - 924
  • [27] Secure self-certified code for Java']Java
    Debbabi, M
    Desharnais, J
    Fourati, M
    Menif, E
    Painchaud, F
    Tawbi, N
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 133 - 151
  • [28] A provably secure certificateless organizational signature schemes
    Allam, Ali M.
    Ali, Ihab A.
    Mahgoub, Shereen M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (05)
  • [29] Self-certified signature scheme from pairings
    Shao, Zuhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (03) : 388 - 395
  • [30] Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key
    Viedma Astudillo, Miguel
    Tellez Isaac, Jesus
    Suarez Touceda, Diego
    Plaza Lopez, Hector
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 155 - +