Convertible Proxy Signcryption Scheme

被引:0
|
作者
李继国
李建中
曹珍富
张亦辰
机构
[1] China
[2] Dept. of Computer Science and Engineering
[3] Harbin 150001
[4] Harbin Institute of Technology
[5] Hohai University
[6] Nanjing 210098
[7] School of Computer Science and Technology
[8] School of Computer and Information Engineering
[9] Shanghai 200030
[10] Shanghai Jiaotong University
关键词
proxy signcryption; nonrepudiation; digital signature; proxy signature;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature. However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver’s benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu’ s scheme and improved Kim’s scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public
引用
收藏
页码:209 / 213
页数:5
相关论文
共 50 条
  • [1] Proxy signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1431 - 1446
  • [2] Identity Based Generalized Proxy Signcryption Scheme
    Zhou, Cai-Xue
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 13 - 26
  • [3] An Efficient Proxy Blind Signcryption Scheme for IoT
    Khan, Aamer
    Ullah, Insaf
    Algarni, Fahad
    Naeem, Muhammad
    Uddin, M. Irfan
    Khan, Muhammad Asghar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 4293 - 4306
  • [4] A new proxy signcryption scheme using warrants
    Elkamchouchi, Hassan M.
    Abouelseoud, Yasmine
    Shouaib, Wafaa S.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2011, 1 (3-4) : 309 - 327
  • [5] Certificateless Proxy Signcryption Scheme from Lattice
    Yu Huifang
    Wang Ning
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (07) : 2584 - 2591
  • [6] Identity based threshold proxy signcryption scheme
    Wang, M
    Liu, ZJ
    [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 695 - 699
  • [7] A Convertible Designated Verifible Blind Multi-signcryption Scheme
    Das, Subhalaxmi
    Mohanty, Sujata
    Majhi, Bansidhar
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 549 - 556
  • [8] Parallel Proxy-Signcryption Scheme in Cloud Environment
    Deng Wenping
    Wu Xuguang
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 402 - 406
  • [9] Construction of Certificateless Proxy Signcryption Scheme From CMGs
    Yu, Huifang
    Wang, Zhicang
    [J]. IEEE ACCESS, 2019, 7 : 141910 - 141919
  • [10] A Proxy Re-signcryption Scheme with Delegation Property
    Alamer, Abdulrahman
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 243 - 259