Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

被引:0
|
作者
Chow, SSM [1 ]
Yiu, SM [1 ]
Hui, LCK [1 ]
Chow, KP [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci & Informat Syst, Hong Kong, Hong Kong, Peoples R China
关键词
identity-based signcryption; forward security; public verifiability; provable security; semantical security; public ciphertext authenticity; network security; firewalls; public key cryptosystems; elliptic curve cryptosystems; cryptographic primitives;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boyen [7] gave the first identity-based (ID-based) signcryp-tion scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryp-tion scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 50 条
  • [31] An efficient multi-PKG ID-based signcryption scheme
    Xu, Q.-L. (xql@sdu.edu.cn), 2012, Science Press (35):
  • [32] Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery
    Li, Min
    Fang, Tao
    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 287 - 293
  • [33] Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices
    Karati, Arijit
    Fan, Chun-I
    Hsu, Ruei-Hau
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10431 - 10440
  • [34] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
    Zhang, Bo
    Xu, Qiuliang
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
  • [35] Provably semi-statically secure broadcast signcryption scheme with small ciphertext
    Li, Ximing
    Yang, Bo
    Zhang, Mingwu
    ICIC Express Letters, 2011, 5 (03): : 803 - 808
  • [36] A Novel ID-Based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Gao, Shengnan
    Chen, Hua
    Geng, Qin
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 604 - 610
  • [37] Comment on an ID-based Broadcast Signcryption Scheme
    Zhang, Jianhong
    Geng, Qin
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
  • [38] Extended identity based multi-signcryption scheme with public verifiability
    Tanwar, Sarvesh
    Kumar, Anil
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (02): : 503 - 517
  • [39] Provably secure blind ID-based strong designated verifier signature scheme
    Zhang, Ning
    Wen, Qiaoyan
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 358 - 362
  • [40] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724