Identity-Based Proxy Signcryption Schemes

Article Preview

Abstract:

Identity-based encryption and signature schemes that allow any pair of users to communicate securely and to verify each other's signatures without verifying certificate. A signcryption is a primitive that provides the properties of both digital signatures and encryption schemes in a way that is more efficient than signing and encrypting separately. Proxy signature schemes are a variation of ordinary digital signature scheme that allow a proxy signer to sign messages on behalf of the original singer which proxy signcryption simultaneously fulfill both the functions of signature and encryption in a single step with a lower computational cost than that required by the traditional signature-then-encryption. In this paper, we present identity-based proxy signcryption schemes with lower efficient..

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2605-2608

Citation:

Online since:

August 2013

Authors:

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) << Cost(Signature) + Cost(Encryption),. CRYPTO 1997, vol. 1294 of LNCS, Springer-Verlag, 1997, pp.165-179.

DOI: 10.1007/bfb0052234

Google Scholar

[2] M. Mambo, K. Usuda and E. Okamoto, Proxy signature: Delegation of the power to sign messages, In IEICE Trans. Fundamentals, Vol. E79-A, No. 9, pp.1338-1353, (1996).

Google Scholar

[3] S. Kim,S. Park,D. Won. Proxy signatures, revisited. Proc. of ICICS'97, International Conference on Informationand Communications Security, LNCS 1334, pages 223-232, (1997).

Google Scholar

[4] B. Lee,H. Kim,K. Kim. Strong proxy signature and its applications. Proc. of SCIS. pages 603-608, (2001).

Google Scholar

[5] F. Zhang,K. Kim. Efficient ID-based blind signatureand proxy signature from bilinear pairings. ACISP 2003, LNCS 2727, pages 312-323, (2003).

DOI: 10.1007/3-540-45067-x_27

Google Scholar

[6] B. D. Boneh and H. Shancham. Efficient signcryption scheme on elliptic curves. In Proc. of IFIP/SEC98. Chapman&Hall, (1998).

Google Scholar

[7] B. D. Boneh and H. ShanchanL New signcryption schemes based on kcdsa. In Proc. of ICISC01, LNCS 2288~ pages 305-317. Springer-Verlag, (2001).

Google Scholar

[8] J. Malon-Lee. Identity-based signcryption http: /eprint. iacr. org/2002/0798.

Google Scholar