Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

被引:0
|
作者
Chow, SSM [1 ]
Yiu, SM [1 ]
Hui, LCK [1 ]
Chow, KP [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci & Informat Syst, Hong Kong, Hong Kong, Peoples R China
关键词
identity-based signcryption; forward security; public verifiability; provable security; semantical security; public ciphertext authenticity; network security; firewalls; public key cryptosystems; elliptic curve cryptosystems; cryptographic primitives;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boyen [7] gave the first identity-based (ID-based) signcryp-tion scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryp-tion scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 50 条
  • [21] UC secure signcryption protocol with public verifiability
    School of Computer Science and Technology, Shandong University, Jinan 250101, China
    Dongnan Daxue Xuebao, 2008, SUPPL. 1 (55-58):
  • [22] Comments on "Provably Secure Generalized Signcryption Scheme With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices"
    Zhang, Bo
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4666 - 4670
  • [23] Efficient identity based proxy-signcryption schemes with forward security and public verifiability
    Wang, M
    Li, H
    Liu, ZJ
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 982 - 991
  • [24] A provably secure and efficient certificateless signcryption scheme
    Sun, H. (sh1227@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [25] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [26] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [27] Cryptanalysis and improvement of a signcryption scheme with public verifiability
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    Tien Tzu Hsueh Pao, 2006, 1 (177-179):
  • [28] Revocable ID-based signcryption scheme
    Liu, Zhenhua
    Li, Juanjuan
    Zu, Longhui
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
  • [29] An ID-based broadcast signcryption scheme
    Qi, Zheng-Hua
    Ren, Xun-Yi
    Yang, Geng
    Yao, Zhuo-Yu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
  • [30] IBASC: Identity based aggregate signcryption scheme with public verifiability
    Han, Yiliang
    Lu, Wanyi
    Yang, Xiaoyuan
    ICIC Express Letters, 2013, 7 (07): : 2075 - 2080