Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs

被引:0
作者
Lin, Han-Yu [1 ]
Wu, Tzong-Sun [2 ]
Huang, Shih-Kun [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
three-party; signcryption; bilinear pairings; public key encryption; provable security; IDENTITY-BASED SIGNCRYPTION; PUBLIC-KEY CRYPTOSYSTEM; DIGITAL-SIGNATURES; PROVABLY SECURE; EFFICIENT; CRYPTANALYSIS; IMPROVEMENT; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A signcryption scheme combining public key encryptions and digital signatures can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation. In a three-party communication environment, a message signcrypted by one party might have to be securely delivered to the other two and they usually independently decrypt the ciphertext and verify recovered signature. Consequently, traditional signcryption schemes of single-recipient setting are not applicable. In this paper, we elaborate on the certificate-based cryptosystem to propose a provably secure three-party signcryption scheme from bilinear pairings. The security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are proved in the random oracle model. Moreover, our scheme enables each recipient to solely reveal the signer's original signature for public verification without extra computational efforts when the case of a later dispute over repudiation occurs. To the best of our knowledge, the proposed scheme is the first provably secure signcryption considering three-party communication environments.
引用
收藏
页码:739 / 753
页数:15
相关论文
共 37 条
  • [31] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [32] Security arguments for digital signatures and blind signatures
    Pointcheval, D
    Stern, J
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (03) : 361 - 396
  • [33] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
  • [34] Stallings W., 2005, CRYPTOGRAPHY NETWORK, V4th
  • [35] Tso R, 2007, INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, P772
  • [36] Identity based signcryption scheme without random oracles
    Yu, Yong
    Yang, Bo
    Sun, Ying
    Zhu, Sheng-lin
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 56 - 62
  • [37] Zheng YL, 1997, LECT NOTES COMPUT SC, V1294, P165