A New Certificateless Forward Secure Proxy Signcryption Scheme

Article Preview

Abstract:

This paper proposes a new certificateless forward secure proxy signcryption scheme based on DLP. Compared with other similar schemes, the scheme has overcome key escrow problem in the id-based cryptography and saving certificate problem in PKI cryptography. The scheme has some good nature, such as unforgeability, non-repudiation, strong identifiability, at the same time, it has forward security and verification. Even the adversaries grab the proxy key in the present phase, they can't forge valid previous signcryption.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

659-662

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] ZHENG YU-LIANG. Digital signcryption or how to achieve cost(signature&encryption) <<cost(signature)+ Cost(encryption)[C]/KALISKIJ R B S Proc of Advances in Cryptology-CRYPTO'97. Berlin: Springer-Verlag, 1997: 165-179.

DOI: 10.1007/bfb0052234

Google Scholar

[2] GAMAGE C, LEIWO J, ZHENG Y. An efficient scheme for secure message transmission using proxy signcryption [C]∥Proceedings of 22nd Australasian Computer Science Conference. Berlin: Springer-Verlag, 1999: 4202431.

Google Scholar

[3] CHAN W K, WEI V K. A threshold proxy signcryption[C]∥Proceedings of International Conference on Security and Management . Monte Carlo Resort, Las Vegas, Nevada, USA, 2002: 24-27.

Google Scholar

[4] LI XIAN XUE, CHEN KEFEI. Identity-based Proxy-signature Scheme from Pairings[C]/Proceedings of SCC'04. Los Alamitos, USA: IEEE Computer Society Press, 2004: 494-497.

DOI: 10.1109/scc.2004.1358050

Google Scholar

[5] WANG MENG, LI HUI, LIU ZHIJING. Efficient Identity-based Proxy-signcryption Schemes with Forword Security and Public Verifiability[C]/Proc. Of the 3rd International Conference on Networking and Mobile Computing. [S. l. ]: Springer-Verlag, 2005: 982-991.

DOI: 10.1007/11534310_103

Google Scholar

[6] DUAN SHANSHAN, CAO ZHENFU, ZHOU YUAN. Secure Delegation-by-warrant ID-based Proxy Signcryption Scheme[C]/Proc. of CIS'05. [S. l. ]: Springer-Verlag, 2005: 445-450.

DOI: 10.1007/11596981_65

Google Scholar

[7] Xuan Yang,Shaoping Yu. An efficient identity-based proxy signcryption scheme[J]. Computer Engineering, 2009, 35(2): 170-171, 183.

Google Scholar

[8] ANDERSON R. Invited lecture∥Proceedings of the 4th ACM Conference on Computer and Communications Security. Zurich, Switerland, 1997: 1-7.

Google Scholar

[9] Gang Yu, Gengxun Huang. A forward secure id-based proxy signcryption scheme[J]. Computer Engineering and Application, 2008, 44(2): 157-159.

Google Scholar

[10] Yixian Yang, Xinxin Niu. Applied Cryptography[M]. Beijing: Beijing University of Posts and Telecommunications Press, 2005: 133-134.

Google Scholar

[11] YONG-RAN LEE AND HYANG-SOOK LEE. An Authenticated Certificateless Public Key Encryption Scheme[J]. Information Center for Mathematical Sciences, Volume 8, Number 1, June, 2005: 177-187.

Google Scholar