Efficient identity based proxy-signcryption schemes with forward security and public verifiability

被引:0
|
作者
Wang, M [1 ]
Li, H
Liu, ZJ
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Li and Chen proposed an identity based proxy-signcryption scheme which is based on the Libert and Quisquater's identity based signcryption scheme recently. However, we demonstrate that their scheme does not satisfy the strong unforgeability and forward security in the strict sense. Furthermore, establishing a secure channel has much influence on their scheme. Based on the new ID-based signcryption scheme proposed by Chow et al, an efficient forward secure and public verifiable identity based proxy-signcryption scheme without the secure channel is proposed. The proposed scheme overcomes the weakness of Li-Chen scheme. The security and performance of the scheme are also analyzed.
引用
收藏
页码:982 / 991
页数:10
相关论文
共 50 条
  • [2] Identity based proxy-signcryption scheme from pairings
    Li, XX
    Chen, KF
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 494 - 497
  • [3] Efficient Identity Based Multi-Signcryption Scheme with Public Verifiability
    Swapna, G.
    Reddy, P. Vasudeva
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02): : 181 - 190
  • [4] An efficient multi-sender identity based threshold signcryption with public verifiability
    Chen, Wen
    Lei, Feiyu
    [J]. EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 149 - +
  • [5] AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Arland, Sakhi S.
    Rangan, C. Pandu
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 362 - 371
  • [6] Identity-based proxy signcryption schemes
    Jian, Wu
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [7] The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment
    Kim, KS
    Kim, JB
    Yang, HK
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 26 - 30
  • [8] IBASC: Identity based aggregate signcryption scheme with public verifiability
    Han, Yiliang
    Lu, Wanyi
    Yang, Xiaoyuan
    [J]. ICIC Express Letters, 2013, 7 (07): : 2075 - 2080
  • [9] On the Security of Identity Based Ring Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 310 - 325
  • [10] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Ch, Shehzad Ashraf
    Uddin, Nizam
    Sher, Muhammad
    Ghani, Anwar
    Naqvi, Husnain
    Irshad, Azeem
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (05) : 1711 - 1723