Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

被引:0
|
作者
Chow, SSM [1 ]
Yiu, SM [1 ]
Hui, LCK [1 ]
Chow, KP [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci & Informat Syst, Hong Kong, Hong Kong, Peoples R China
关键词
identity-based signcryption; forward security; public verifiability; provable security; semantical security; public ciphertext authenticity; network security; firewalls; public key cryptosystems; elliptic curve cryptosystems; cryptographic primitives;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boyen [7] gave the first identity-based (ID-based) signcryp-tion scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryp-tion scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 50 条
  • [1] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [2] A provably secure ID-based mediated signcryption scheme
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +
  • [3] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    PROVABLE SECURITY, 2008, 5324 : 210 - +
  • [5] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [6] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [7] Efficient short signcryption scheme with public verifiability
    Ma, Changshe
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 118 - 129
  • [8] AN EFFICIENT AND PROVABLY SECURE ID-BASED SIGNATURE SCHEME WITH BATCH VERIFICATIONS
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3911 - 3922
  • [9] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Ch, Shehzad Ashraf
    Uddin, Nizam
    Sher, Muhammad
    Ghani, Anwar
    Naqvi, Husnain
    Irshad, Azeem
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (05) : 1711 - 1723
  • [10] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Shehzad Ashraf Ch
    Nizam uddin
    Muhammad Sher
    Anwar Ghani
    Husnain Naqvi
    Azeem Irshad
    Multimedia Tools and Applications, 2015, 74 : 1711 - 1723