Research on ID-Based Proxy Re-Signcryption Scheme

Article Preview

Abstract:

The ID of the user is the public key, key generator center (KGC) generates the prime key, and the private key of the user is generated by the user's ID through KGC. This paper constructs a new ID-based proxy re-signcryption scheme, in this scheme, uses a semi-trusted agent to achieve the transparent conversion between identiy decryption and identity verification, the verification of signcryption doesn't need the plaintext, in the random oracle model, based on the GBDH problem, we prove that this scheme is secure..

You might also be interested in these eBooks

Info:

Periodical:

Pages:

663-666

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zheng Yu-liang. Digital signcryption or how to achieve cost(signature&encryption)<< cost(signature)+cost(encryption)[C]. KALISKIJ R B S Proc of Advances in CRYPTO'97. Berlin: Springer-Verlag, 1997: 165-179.

DOI: 10.1007/bfb0052234

Google Scholar

[2] Weidong Chen, Dengguo Feng. the Application of Signcryption Scheme in Distributed Protocol [J]. Journal of Computers, 2005, 28(9): 1421- 1430.

Google Scholar

[3] AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[A]. In Proceedings of Advances in Cryptology-Asiacrypt'03, Nov30-Dec4, 2003, Taipei, Taiwan, LNCS2894, Berlin: Springer-Verlag, 2003: 452-473.

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar

[4] Gang Yu, Hongzhi Yang, Shuqin Fan, et al. Efficient Certificateless Signcryption Scheme[C]. Proceedings of the Third International Symposium on Electronic Commerce and Security Workshops(ISES'10), Guangzhou, P.R. China, 29-31, July 2010: 055-0559.

Google Scholar

[5] Wu Chenhuang, Chen Zhixiong. A new efficient certificateless signcryption scheme[C]. Proc of ISISE08, vol, 1, 2008: 661-664.

DOI: 10.1109/isise.2008.206

Google Scholar

[6] Barbosa M, Farshim P. Certificateless signcryption[C]. Proc of ASIACCS2008. New York: ACM, 2008: 369-372.

Google Scholar

[7] Li Fagen, Masaaki S, Tsuyoshi T. Certificateless hybrid signcryption[G] PPLNCS5451: Proc of ISPEC2009. Berlin: Springer-verlag, 2009: 112-123.

Google Scholar

[8] Hui Zhu,Hui Li,Yuming Wang. Do Not Use Bilinear Pairing Uncertificated Scheme [J]. Computer Research and Development, 2010, 47(9): 1587-1594.

Google Scholar

[9] S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, Proceedings of ASIACRYPT 2003, LNCS 2894, Springer-Verlag, 2003, p.452–473.

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar