Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security

被引:2
|
作者
LEI Fei-yu
机构
关键词
signcryption; identity based; public verifiability; forward security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
引用
收藏
页码:248 / 250
页数:3
相关论文
共 50 条
  • [21] An identity-based threshold signcryption scheme with semantic security
    Peng, CG
    Li, X
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 173 - 179
  • [22] A sanitizable signcryption scheme with public verifiability via chameleon hash function
    Hu, Shuang
    Zhang, Renjun
    Wang, Fuqun
    Chen, Kefei
    Lian, Bin
    Chen, Gongliang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [23] An efficient signcryption scheme with forward secrecy based on elliptic curve
    Hwang, RJ
    Lai, CH
    Su, FF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 870 - 881
  • [24] Efficient identity based signature/signcryption scheme in the standard model
    Ren Yanli
    Gu Dawu
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 133 - +
  • [25] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [26] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [27] An Efficient Identity-based Multi-signcryption Scheme
    Qi, Z. H.
    Yang, H. C.
    Huang, H.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
  • [28] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Srinivasan, Rahul
    Rangan, Chandrasekaran Pandu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
  • [29] Efficient identity-based signcryption scheme for multiple receivers
    Yu, Yong
    Yang, Bo
    Huang, Xinyi
    Zhang, Mingwu
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 13 - +
  • [30] Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve
    Toorani, Mohsen
    Shirazi, Ali Asghar Beheshti
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 428 - 432