Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

被引:0
|
作者
Chow, SSM [1 ]
Yiu, SM [1 ]
Hui, LCK [1 ]
Chow, KP [1 ]
机构
[1] Univ Hong Kong, Dept Comp Sci & Informat Syst, Hong Kong, Hong Kong, Peoples R China
关键词
identity-based signcryption; forward security; public verifiability; provable security; semantical security; public ciphertext authenticity; network security; firewalls; public key cryptosystems; elliptic curve cryptosystems; cryptographic primitives;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boyen [7] gave the first identity-based (ID-based) signcryp-tion scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryp-tion scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes.
引用
收藏
页码:352 / 369
页数:18
相关论文
共 50 条
  • [41] Tight chosen ciphertext attack(CCA)-secure hybrid encryption scheme with full public verifiability
    KANG Li
    TANG XiaoHu
    LIU JiaFen
    ScienceChina(InformationSciences), 2014, 57 (11) : 162 - 175
  • [42] Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability
    Li Kang
    XiaoHu Tang
    JiaFen Liu
    Science China Information Sciences, 2014, 57 : 1 - 14
  • [43] An efficient and provably secure public key encryption scheme based on coding theory
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1440 - 1447
  • [44] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176
  • [45] Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability
    Kang Li
    Tang XiaoHu
    Liu JiaFen
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (11) : 1 - 14
  • [46] New chosen ciphertext secure ID-based threshold decryption scheme from pairing
    Cryptography and Information Security Laboratory, Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    Jisuanji Xuebao, 2006, 9 (1679-1687):
  • [47] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [48] An ID-based proxy signcryption scheme with fast revocation
    National Key Lab. of ISN, Xidian University, Xi'an 710071, China
    不详
    不详
    Dianzi Yu Xinxi Xuebao, 2008, 3 (672-675):
  • [49] Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    Wang, Hui
    JOURNAL OF COMPUTERS, 2012, 7 (06) : 1345 - 1352
  • [50] Efficient and secure user identification scheme based on ID-based cryptosystem
    Kim, Kee-Won
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    INTERNATIONAL E-CONFERENCE ON COMPUTER SCIENCE 2005, 2005, 2 : 79 - 82