Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs

被引:0
|
作者
Lin, Han-Yu [1 ]
Wu, Tzong-Sun [2 ]
Huang, Shih-Kun [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
three-party; signcryption; bilinear pairings; public key encryption; provable security; IDENTITY-BASED SIGNCRYPTION; PUBLIC-KEY CRYPTOSYSTEM; DIGITAL-SIGNATURES; PROVABLY SECURE; EFFICIENT; CRYPTANALYSIS; IMPROVEMENT; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A signcryption scheme combining public key encryptions and digital signatures can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation. In a three-party communication environment, a message signcrypted by one party might have to be securely delivered to the other two and they usually independently decrypt the ciphertext and verify recovered signature. Consequently, traditional signcryption schemes of single-recipient setting are not applicable. In this paper, we elaborate on the certificate-based cryptosystem to propose a provably secure three-party signcryption scheme from bilinear pairings. The security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are proved in the random oracle model. Moreover, our scheme enables each recipient to solely reveal the signer's original signature for public verification without extra computational efforts when the case of a later dispute over repudiation occurs. To the best of our knowledge, the proposed scheme is the first provably secure signcryption considering three-party communication environments.
引用
收藏
页码:739 / 753
页数:15
相关论文
共 50 条
  • [21] Three-Party ORAM for Secure Computation
    Faber, Sky
    Jarecki, Stanislaw
    Kentros, Sotirios
    Wei, Boyang
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 360 - 385
  • [22] Provably secure certificate-based proxy blind signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    Singh, Harendra
    INFORMATION SCIENCES, 2018, 468 : 1 - 13
  • [23] Provably Secure Three-Party Authenticated Key Exchange Based on Certificate less Key Encapsulation Sensor Mechanism
    Yang, Junhan
    Cao, Tianjie
    SENSOR LETTERS, 2013, 11 (11) : 2141 - 2144
  • [24] Efficient Certificate-Based Signature Scheme
    Ming, Yang
    Wang, Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 87 - +
  • [25] Forward-Secure Certificate-Based Encryption
    Lu, Yang
    Li, Jiguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 57 - 60
  • [26] Improved for certificate-based signature scheme
    Department of Computer Science, Minnan Normal University, Zhangzhou
    Fujian
    363000, China
    Beijing Youdian Daxue Xuebao, 3 (48-52):
  • [27] Cryptanalysis of a Certificate-Based on Signature Scheme
    Cheng, Lin
    Xiao, Ying
    Wang, Gang
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2821 - 2825
  • [28] Certificate-Based Signcryption Scheme without Pairing: Directly Verifying Signcrypted Messages Using a Public Key
    Le, Minh-Ha
    Hwang, Seong Oun
    ETRI JOURNAL, 2016, 38 (04) : 724 - 734
  • [29] A Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems
    Asghar Khan, Muhammad
    Ullah, Insaf
    Kumar, Neeraj
    Afghah, Fatemeh
    Barb, Gordana
    Noor, Fazal
    Alqahtany, Saad
    IEEE ACCESS, 2024, 12 : 83466 - 83479
  • [30] Three-party simultaneous quantum secure direct communication scheme with EPR pairs
    Mei-Yu, Wang
    Feng-Li, Yan
    CHINESE PHYSICS LETTERS, 2007, 24 (09) : 2486 - 2488