Skip to main content
Log in

A generic solution to realize public verifiability of signcryption

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Signcryption has been a rapidly emerging efficient approach to achieve authenticity and confidentiality within a logic single step. However, it is still a difficult problem to realize public verifiability of signcryption in an efficient and secure way. Here, we present a generic solution to realize public verifiability based on quadratic residue.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zheng Y. Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost (Signature) + Cost (Encryption) [C]//Advances in Cryptology—Crypto'97: 17th Annual International Cryptology Conference. Santa Barbara, California: Springer Press, 1997:165–179.

    Google Scholar 

  2. Bao F, Deng R H. A Signcryption Scheme with Signature Directly Verifiable by Public Key [C]//1st International Workshop on Practice and Theory in Public Key Cryptography (PKC1998) Pacifico Yokohama: Springer Press, 1998:55–59.

    Google Scholar 

  3. Malone L J, Mao W. Two Birds one Stone: Signcryption Using RSA [C]//Topics in Cryptology-CT-RSA 2003,The Cryptographers' Track at the RSA Conference 2003. San Francisco, CA: Springer Press, 2003:211–225.

    Google Scholar 

  4. Shin J B, Lee K, Shim K. New DSA-Verifiable Signcryption Schemes [C]//5th International Conference on Information Security and Cryptology (ICISC 2002). Seoul: Springer Press, 2003:35–47.

    Google Scholar 

  5. Steinfeld R, Zheng Y. A Signcryption Scheme Based on Integer Factorization [C]//3rd International Workshop on Information Security (ISW 2000). Wollongong: Springer Press, 2000:308–322.

    Google Scholar 

  6. Libert B, Quisquater J J. Efficient Signcryption with Key Privacy from Gap-Diffie-Hellman Groups [C]//7th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2004). Singapore: Springer Press, 2004:187–200.

    Google Scholar 

  7. Menezes A J, Van Oorschot P, Vanstone S A.Handbook of Applied Cryptography [M]. Boca Raton: CRC Press, 1997.

    Google Scholar 

  8. Ostrovsky R, Yung M. How to Withstand Mobile Virus Attacks [C]//10th Annual ACM Symposium on Princiles of Distributed Computing (PODC1991). Montreal: ACM Press, 1991:51–59.

    Google Scholar 

  9. Bellare M, Rogaway P. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols [C]//Proc of the 1st ACM Conference on Computer and Communications Security. Fairfax, Virginia: ACM Press, 1993:62–73.

    Google Scholar 

  10. Baek J, Ron S, Zheng Y. Formal Proofs for the Security Signcryption [C]//5th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2002). Paris: Springer Press, 2002:80–98.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chen Kefei.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60273049, 60303026, 90104005)

Biography: LEI felyu (1978-), male, Ph. D. candidate, research direction: network security and cryptography

Rights and permissions

Reprints and permissions

About this article

Cite this article

Feiyu, L., Wen, C. & Kefei, C. A generic solution to realize public verifiability of signcryption. Wuhan Univ. J. Nat. Sci. 11, 1589–1592 (2006). https://doi.org/10.1007/BF02831827

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831827

Key words

CLC number

Navigation