Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security

被引:2
|
作者
LEI Fei-yu
机构
关键词
signcryption; identity based; public verifiability; forward security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
引用
收藏
页码:248 / 250
页数:3
相关论文
共 50 条
  • [31] An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings
    Elkamchouchi, Hassan
    Abou El-kheir, Eman
    Abouelseoud, Yasmine
    2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 80 - 85
  • [32] Efficient identity-based multi-recipient signcryption scheme
    Du, Hong-Zhen
    Wen, Qiao-Yan
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2009, 26 (02): : 127 - 131
  • [33] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [34] A Generic Solution to Realize Public Verifiability of Signcryption
    LEI Feiyu~1
    2. School of Information Science and Technology
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1589 - 1592
  • [35] UC secure signcryption protocol with public verifiability
    School of Computer Science and Technology, Shandong University, Jinan 250101, China
    Dongnan Daxue Xuebao, 2008, SUPPL. 1 (55-58):
  • [36] An Efficient Signcryption Scheme based on ECC with Forward Secrecy and Encrypted Message Authentication
    Dutta, Maitreyee
    Singh, Anuj Kumar
    Kumar, Ajay
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 399 - 403
  • [37] A Secure and Efficient Identity based Proxy Signcryption Scheme for Smart Grid Network
    Patil R.
    Patil Y.H.
    Journal of Engineering Science and Technology Review, 2022, 15 (04) : 82 - 89
  • [38] AN EFFICIENT IDENTITY-BASED RING SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
    Sun Hua
    Guo Li
    Wang Aimin
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 673 - +
  • [39] On the Security of Identity Based Ring Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 310 - 325
  • [40] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310