Signcryption with non-interactive non-repudiation

被引:11
|
作者
Malone-Lee, J [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
signcryption; non-repudiation; provable security;
D O I
10.1007/s10623-004-3806-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption [33] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive non-repudiation. This is non-repudiation in which the judge settling a repudiation dispute does not have to get involved in an interactive zero-knowledge proof. Our model applies to many existing schemes in the literature Bao and Deng, [4] He and Wu, [22] Peterson and Michels, [28]. We explain why the scheme proposed in Bao and Deng, [4] is insecure under any definition of privacy based on the idea of indistinguishable encryptions Goldwasser and Micali, [20]. We describe a modified scheme to overcome the problem. Proofs of security are given for the scheme in the random oracle model Bellare and Rogaway, [10].
引用
收藏
页码:81 / 109
页数:29
相关论文
共 50 条
  • [31] Non-repudiation with mandatory proof of receipt
    Coffey, Tom
    Saidha, Puneet
    Computer Communication Review, 1996, 26 (01): : 6 - 17
  • [32] Anonymous fingerprinting with direct non-repudiation
    Pfitzmann, B
    Sadeghi, AR
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 401 - 414
  • [33] On the efficient implementation of fair non-repudiation
    You, Cheng-Hwee
    Zhou, Jianying
    Lam, Kwok-Yan
    Computer Communication Review, 1998, 28 (05): : 50 - 60
  • [34] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [35] A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
    蒋晓宁
    叶澄清
    Journal of Zhejiang University Science, 2000, (03) : 80 - 84
  • [36] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [37] A formal treatment of non-repudiation protocols
    Hada, S
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (02) : 461 - 470
  • [38] A proof of non-repudiation - (Transcript of discussion)
    Paulson, L
    SECURITY PROTOCOLS, 2002, 2467 : 126 - 133
  • [39] On the security of fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    Vogt, H
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 193 - 207
  • [40] A formal analysis of CORBA non-repudiation
    Zheng, H
    Song, GX
    International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 401 - 405