Efficient self-certified proxy CAE scheme and its variants

被引:7
|
作者
Wu, Tzong-Sun [2 ]
Lin, Han-Yu [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
关键词
Self-certified; Proxy signature; Authenticated encryption; Convertible; AUTHENTICATED ENCRYPTION SCHEMES; LIMITED VERIFIER SIGNATURE;
D O I
10.1016/j.jss.2008.12.040
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Elaborating on the merits of proxy signature schemes and convertible authenticated encryption (CAE) schemes, we adopt self-certified public key systems to construct efficient proxy CAE schemes enabling an authorized proxy signer to generate an authenticated ciphertext on behalf of the original signer. To satisfy the requirement of confidentiality, only the designated recipient is capable of decrypting the ciphertext and verifying the proxy signature. A significant advantage of the proposed schemes is that the proxy signature conversion process takes no extra cost, i.e., when the case of a later dispute over repudiation occurs, the designated recipient can easily reveal the ordinary proxy signature for the public arbitration. If needed, the designated recipient can also convince anyone that he is the real recipient. In addition, integrating with self-certified public key systems, our schemes can earn more computational efficiency, since authenticating the public key and verifying the proxy signature can be simultaneously carried out within one-step. (c) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:974 / 980
页数:7
相关论文
共 50 条
  • [41] Cryptanalysis of an authenticated encryption scheme using self-certified public keys
    Tsai, CS
    Lin, SC
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 118 - 122
  • [42] An improved and provable self-certified digital signature scheme with message recovery
    Wu, Fan
    Xu, Lili
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 344 - 357
  • [43] CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY
    Chande, Manoj Kumar
    Lee, Cheng-Chi
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2016, 53 (04) : 1051 - 1069
  • [44] Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    Tsai, Pei-Ling
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 914 - 924
  • [45] New self-certified key distribution scheme based on the elliptic curve cryptosystem
    Xiao, You-An
    Zhou, Zu-De
    Dalian Haishi Daxue Xuebao/Journal of Dalian Maritime University, 2007, 33 (04): : 56 - 59
  • [46] Self-certified keys - Concepts and applications
    Petersen, H
    Horster, P
    COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 102 - 116
  • [47] A New Self-Certified Signature Scheme Based on NTRUSing for Smart Mobile Communications
    Daofeng Li
    Haiqiang Chen
    Cheng Zhong
    Taoshen Li
    Feng Wang
    Wireless Personal Communications, 2017, 96 : 4263 - 4278
  • [48] A Identification and Key Establishment Scheme based on Self-Certified Public Key for MANETs
    Zhang, Dongwei
    Sun, Yi
    Luo, Yuanyan
    2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [49] On the Security of Self-Certified Public Keys
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Liao, I-En
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (02) : 54 - 60
  • [50] A New Self-Certified Signature Scheme Based on NTRUSing for Smart Mobile Communications
    Li, Daofeng
    Chen, Haiqiang
    Zhong, Cheng
    Li, Taoshen
    Wang, Feng
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4263 - 4278