Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs

被引:0
作者
Lin, Han-Yu [1 ]
Wu, Tzong-Sun [2 ]
Huang, Shih-Kun [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
three-party; signcryption; bilinear pairings; public key encryption; provable security; IDENTITY-BASED SIGNCRYPTION; PUBLIC-KEY CRYPTOSYSTEM; DIGITAL-SIGNATURES; PROVABLY SECURE; EFFICIENT; CRYPTANALYSIS; IMPROVEMENT; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A signcryption scheme combining public key encryptions and digital signatures can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation. In a three-party communication environment, a message signcrypted by one party might have to be securely delivered to the other two and they usually independently decrypt the ciphertext and verify recovered signature. Consequently, traditional signcryption schemes of single-recipient setting are not applicable. In this paper, we elaborate on the certificate-based cryptosystem to propose a provably secure three-party signcryption scheme from bilinear pairings. The security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are proved in the random oracle model. Moreover, our scheme enables each recipient to solely reveal the signer's original signature for public verification without extra computational efforts when the case of a later dispute over repudiation occurs. To the best of our knowledge, the proposed scheme is the first provably secure signcryption considering three-party communication environments.
引用
收藏
页码:739 / 753
页数:15
相关论文
共 37 条
  • [1] Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
  • [2] [Anonymous], 2003, INFORM SECURITY CRYP
  • [3] [Anonymous], 1992, P LECT NOTES COMPUTE, DOI DOI 10.1007/3-540-47555-9_32
  • [4] [Anonymous], INF SEC WORKSH SPRIN
  • [5] Bao F., 1998, Public Key Cryptography. First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98. Proceedings, P55, DOI 10.1007/BFb0054014
  • [6] Barreto PSLM, 2004, LECT NOTES COMPUT SC, V3006, P17
  • [7] Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
  • [8] Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
  • [9] Bellare M., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P280
  • [10] Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383