Paper Title:
Study on Public Verifiability in Signcryption Scheme
  Abstract

Public verifiability in signcryption achieves public verification of signature by a trustable third party; it ensures the reliability and secure parity of signcryption scheme. In the paper, we analyzed the public verification algorithm in signcryption and presented signcryption scheme without verifiability based on discrete logarithm problem as a comparison. Signcryption without verifiability satisfies the basic requirements of authenticated encryption; it can achieve secret message transmission and identity authentication in a single protocol. But the signcryption sender can cheat in the protocol with forged information for lack of supervision by public verification. Then we presented an improved signcryption scheme with public verifiability, in the scheme signcryption message is generated with private key of message sender and other public parameters, any trustable third party can verify the signcryption without disclosing private key or secret parameters. Besides, the attack on the signcryption and secret parameters via public verification data is computationally infeasible. The scheme reinforces the security and reliability of signcryption and effectively improves its efficiency for engineering application.

  Info
Periodical
Edited by
Qi Luo
Pages
706-712
DOI
10.4028/www.scientific.net/AMM.20-23.706
Citation
X. W. Zhou, "Study on Public Verifiability in Signcryption Scheme ", Applied Mechanics and Materials, Vols. 20-23, pp. 706-712, 2010
Online since
January 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a...
505
Authors: Xuan Wu Zhou
Abstract:In the paper, we analyzed optimization algorithms for proxy signature and presented an optimized proxy signature scheme based on discrete...
518
Authors: Xuan Wu Zhou
Abstract:In the paper, we analyzed the system optimization algorithms in e-cash (electronic cash) by improving the efficiency of e-cash for software...
532
Authors: Xuan Wu Zhou
Abstract:As a typical fast public key cryptosystem, HCC (Hyper-elliptic Curves Cryptosystem) provides efficient asymmetric algorithms for cryptography...
546
Authors: Xuan Wu Zhou, Yan Fu
Abstract:Discrete logarithm problem is an important trapdoor function to design asymmetric cryptosystem, and some fast public key cryptosystems have...
1318