Signcryption with non-interactive non-repudiation

被引:11
|
作者
Malone-Lee, J [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
signcryption; non-repudiation; provable security;
D O I
10.1007/s10623-004-3806-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption [33] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive non-repudiation. This is non-repudiation in which the judge settling a repudiation dispute does not have to get involved in an interactive zero-knowledge proof. Our model applies to many existing schemes in the literature Bao and Deng, [4] He and Wu, [22] Peterson and Michels, [28]. We explain why the scheme proposed in Bao and Deng, [4] is insecure under any definition of privacy based on the idea of indistinguishable encryptions Goldwasser and Micali, [20]. We describe a modified scheme to overcome the problem. Proofs of security are given for the scheme in the random oracle model Bellare and Rogaway, [10].
引用
收藏
页码:81 / 109
页数:29
相关论文
共 50 条
  • [1] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [2] Generic Constructions for Signcryption with Non-interactive Non-repudiation
    Fan, Jia
    Zhang, Lijun
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 15 - 18
  • [3] Signcryption with non-interactive non-repudiation without random oracles
    Fan J.
    Zheng Y.
    Tang X.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1): : 202 - 230
  • [4] An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation
    Togde, Ngarenon
    Sarr, Augustin P.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2023, 2024, 14412 : 117 - 138
  • [5] A Computational Diffie-Hellman-Based Insider Secure Signcryption with Non-interactive Non-repudiation
    Togde, Ngarenon
    Sarr, Augustin P.
    MATHEMATICS AND COMPUTING, ICMC 2022, 2022, 415 : 89 - 101
  • [6] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [7] A proof of non-repudiation
    Bella, G
    Paulson, LC
    SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [8] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    J Network Comput Appl, 3 (267-281):
  • [9] Observations on non-repudiation
    Lect Notes Comput Sci, (133):
  • [10] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132