Signcryption with non-interactive non-repudiation

被引:11
|
作者
Malone-Lee, J [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
signcryption; non-repudiation; provable security;
D O I
10.1007/s10623-004-3806-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption [33] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive non-repudiation. This is non-repudiation in which the judge settling a repudiation dispute does not have to get involved in an interactive zero-knowledge proof. Our model applies to many existing schemes in the literature Bao and Deng, [4] He and Wu, [22] Peterson and Michels, [28]. We explain why the scheme proposed in Bao and Deng, [4] is insecure under any definition of privacy based on the idea of indistinguishable encryptions Goldwasser and Micali, [20]. We describe a modified scheme to overcome the problem. Proofs of security are given for the scheme in the random oracle model Bellare and Rogaway, [10].
引用
收藏
页码:81 / 109
页数:29
相关论文
共 50 条
  • [21] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [22] Non-repudiation and the metaphysics of presence
    Roe, Michael
    SECURITY PROTOCOLS, 2007, 4631 : 207 - 214
  • [23] Non-repudiation in Ad Hoc Networks
    Tandel, Purvi
    Valiveti, Sharada
    Agrawal, K. P.
    Kotecha, K.
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 405 - 415
  • [24] A key authentication scheme with non-repudiation
    Hwang, Min-Shiang
    Li, Li-Hua
    Lee, Cheng-Chi
    Operating Systems Review (ACM), 2004, 38 (03): : 75 - 78
  • [25] Non-repudiation in SET: Open issues
    Van Herreweghen, E
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 140 - 156
  • [26] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [27] Securing digital signatures for non-repudiation
    Zhou, J
    Lam, KY
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 710 - 716
  • [28] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [29] Non-repudiation protocols for multiple entities
    Onieva, JA
    Zhou, JY
    Lopez, J
    COMPUTER COMMUNICATIONS, 2004, 27 (16) : 1608 - 1616
  • [30] Some guidelines for non-repudiation protocols
    Louridas, P
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (05) : 29 - 38