Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security

被引:2
|
作者
LEI Fei-yu
机构
关键词
signcryption; identity based; public verifiability; forward security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
引用
收藏
页码:248 / 250
页数:3
相关论文
共 50 条
  • [41] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293
  • [42] Identity Based Generalized Proxy Signcryption Scheme
    Zhou, Cai-Xue
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 13 - 26
  • [43] An efficient signcryption scheme based on CPK
    College of Information Technical Science, Nankai University, Tianjin 300071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2009, 7 (1753-1757):
  • [44] On the security of a certificate-based signcryption scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, CESER Publications, Post Box No. 113, Roorkee, 247667, India (49):
  • [45] Identity based threshold proxy signcryption scheme
    Wang, M
    Liu, ZJ
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 695 - 699
  • [46] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489
  • [47] On the security of a group signcryption scheme from distributed signcryption scheme
    Bao, HY
    Cao, ZF
    Qian, HF
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 26 - 34
  • [48] Efficient secret authenticatable anonymous signcryption scheme with identity privacy
    Zhang, Mingwu
    Yang, Bo
    Zhu, Shenglin
    Zhang, Wenzheng
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 126 - +
  • [49] Efficient proxy signcryption scheme with provable CCA and CMA security
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    Yeh, Yi-Shiung
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (07) : 1850 - 1858
  • [50] An Efficient and Secure Scheme for Smart Home Communication using Identity-Based Signcryption
    Ashibani, Yosef
    Mahmoud, Qusay H.
    2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017,