Signcryption with non-interactive non-repudiation

被引:10
|
作者
Malone-Lee, J [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
signcryption; non-repudiation; provable security;
D O I
10.1007/s10623-004-3806-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption [33] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive non-repudiation. This is non-repudiation in which the judge settling a repudiation dispute does not have to get involved in an interactive zero-knowledge proof. Our model applies to many existing schemes in the literature Bao and Deng, [4] He and Wu, [22] Peterson and Michels, [28]. We explain why the scheme proposed in Bao and Deng, [4] is insecure under any definition of privacy based on the idea of indistinguishable encryptions Goldwasser and Micali, [20]. We describe a modified scheme to overcome the problem. Proofs of security are given for the scheme in the random oracle model Bellare and Rogaway, [10].
引用
收藏
页码:81 / 109
页数:29
相关论文
共 50 条
  • [1] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [2] Generic Constructions for Signcryption with Non-interactive Non-repudiation
    Fan, Jia
    Zhang, Lijun
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 15 - 18
  • [3] Signcryption with non-interactive non-repudiation without random oracles
    Fan J.
    Zheng Y.
    Tang X.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1): : 202 - 230
  • [4] An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation
    Togde, Ngarenon
    Sarr, Augustin P.
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2023, 2024, 14412 : 117 - 138
  • [5] A Computational Diffie-Hellman-Based Insider Secure Signcryption with Non-interactive Non-repudiation
    Togde, Ngarenon
    Sarr, Augustin P.
    [J]. MATHEMATICS AND COMPUTING, ICMC 2022, 2022, 415 : 89 - 101
  • [6] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [7] A proof of non-repudiation
    Bella, G
    Paulson, LC
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [8] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    [J]. J Network Comput Appl, 3 (267-281):
  • [9] Observations on non-repudiation
    [J]. Lect Notes Comput Sci, (133):
  • [10] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    [J]. PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73