Abstract
Self-certified signcryption can remove key escrow problem and certification management problem. Based on Boneh and Boyen’s short signature scheme, a secure self-certified signcryption scheme is proposed. Under the strong Diffie-Hellman assumption, the new scheme is proved secure, in which it satisfies public verifiability and existential unforgeablity. Furthermore, performance analysis shows that the proposed scheme only requires two pairing evaluations, so it can be used in the power and bandwidth limited environments.
Similar content being viewed by others
References
Diffie W, Hellman M. New directions in cryptography [C]// IEEE Transactions on Information Theory. Washington D C: IEEE Press, 1976: 644–654.
Shamir A. Identity based cryptosystems and signature schemes [C]//Advances in Cryptology-Crypto’84. New York: Springer-Verlag, 1984: 47–53.
Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C]//Advances in Cryptology-Crypto 2001. New York: Springer-Verlag, 2001: 213–229.
Riyami A L, Paterson K G. Certficateless public key cryptography [C]//Advances in cryptology-Asiacrypt 2003. Heidelberg: Springer-Verlag, 2003: 452–473.
Gentry C. Certificate-based encryption and the certificate revocation problem [C]//Advances in Cryptology-Eurocrypt 2003. New York: Springer-Verlag, 2003: 272–293.
Zheng Y L. Digital signcryption or how to achieve cost (Signature &Encryption)_Cost (Signature) + Cost (Encryption) [C]//Advances in Cryptology-Crypto’97. New York: Springer-Verlag, 1997: 165–179.
Baek J, Steinfeld R, Zheng Y L. Formal proofs for the security of signcryption [C]//Public Key Cryptography, PKC 2002. Berlin: Springer-Verlag, 2002: 80–98.
Luo M, Wen Y, Zhao H. A certificate-based signcryption scheme [C]//International Conference on Computer Science and Information Technology. Amsterdam: MCCSIS, 2008: 17–23.
Lu Y, Li J. Certificate-based signcryption: Security model and efficient construction [EB/OL]. [2011-01-15]. http://eprint.iacr.org/2011/542.pdf.
Li J, Huang X, Hong M, et al. Certificate-based signcryption with enhanced security features [J]. Computers and Mathematics with Applications, 2012, 64(6): 1587–1601.
Boneh D, Boyen X. Short signatures without random oracles [C]//Advances in Cryptology Eurocrypt 2004. New York: Springer-Verlag, 2004: 56–73.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation: Supported in part by the National Natural Science Foundation of China (60903196, 61272451, 61173154) and the Natural Science Foundation of Hubei Province (2013CFB039)
Biography: LIU Zhiyuan, male, Ph.D., Associate professor, research direction: information security and cloud computing security.
Rights and permissions
About this article
Cite this article
Liu, Z., Chen, J. A signcryption scheme based on self-certified cryptography. Wuhan Univ. J. Nat. Sci. 19, 169–172 (2014). https://doi.org/10.1007/s11859-014-0996-2
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-014-0996-2