Signcryption with non-interactive non-repudiation

被引:10
|
作者
Malone-Lee, J [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
signcryption; non-repudiation; provable security;
D O I
10.1007/s10623-004-3806-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption [33] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature. We present a model of security for signcryption schemes that offer non-interactive non-repudiation. This is non-repudiation in which the judge settling a repudiation dispute does not have to get involved in an interactive zero-knowledge proof. Our model applies to many existing schemes in the literature Bao and Deng, [4] He and Wu, [22] Peterson and Michels, [28]. We explain why the scheme proposed in Bao and Deng, [4] is insecure under any definition of privacy based on the idea of indistinguishable encryptions Goldwasser and Micali, [20]. We describe a modified scheme to overcome the problem. Proofs of security are given for the scheme in the random oracle model Bellare and Rogaway, [10].
引用
下载
收藏
页码:81 / 109
页数:29
相关论文
共 50 条
  • [41] On the security of fair non-repudiation protocols
    Gürgens S.
    Rudolph C.
    Vogt H.
    International Journal of Information Security, 2005, 4 (4) : 253 - 262
  • [42] An email system with non-repudiation service
    Natural Science Academic Publishing Center of Higher Education Press, Beijing 100029, China
    J. China Univ. Post Telecom., 2007, SUPPL. 1 (124-130):
  • [43] Evolution of fair non-repudiation with TTP
    Zhou, JY
    Deng, R
    Bao, F
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 258 - 269
  • [44] Improvement of a fair non-repudiation protocol
    Wen, Jinghua
    Liang, Min
    Yang, Zirong
    Li, Xiang
    PROCEEDINGS OF E-ENGDET2006, 2006, : 70 - 74
  • [46] Towards verification of timed non-repudiation protocols
    Wei, K
    Heather, J
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 244 - 257
  • [47] Automated Design of Non-repudiation Security Protocols
    Xue, Haifeng
    Zhang, Huanguo
    Qing, Sihan
    Yu, Rongwei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
  • [48] Solution for Non-Repudiation in GSM WAP Applications
    Toma, Cristian
    Popa, Marius
    Boja, Catalin
    SEPADS 08: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 212 - 219
  • [49] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [50] Data Leakage Tracking - Non-Repudiation of Forwarding
    Schick, Rainer
    Ruland, Christoph
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 163 - 173