Skip to main content
Log in

A signcryption scheme based on self-certified cryptography

  • Computer Science
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Self-certified signcryption can remove key escrow problem and certification management problem. Based on Boneh and Boyen’s short signature scheme, a secure self-certified signcryption scheme is proposed. Under the strong Diffie-Hellman assumption, the new scheme is proved secure, in which it satisfies public verifiability and existential unforgeablity. Furthermore, performance analysis shows that the proposed scheme only requires two pairing evaluations, so it can be used in the power and bandwidth limited environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Diffie W, Hellman M. New directions in cryptography [C]// IEEE Transactions on Information Theory. Washington D C: IEEE Press, 1976: 644–654.

    Google Scholar 

  2. Shamir A. Identity based cryptosystems and signature schemes [C]//Advances in Cryptology-Crypto’84. New York: Springer-Verlag, 1984: 47–53.

    Google Scholar 

  3. Boneh D, Franklin M. Identity-based encryption from the Weil pairing [C]//Advances in Cryptology-Crypto 2001. New York: Springer-Verlag, 2001: 213–229.

    Google Scholar 

  4. Riyami A L, Paterson K G. Certficateless public key cryptography [C]//Advances in cryptology-Asiacrypt 2003. Heidelberg: Springer-Verlag, 2003: 452–473.

    Google Scholar 

  5. Gentry C. Certificate-based encryption and the certificate revocation problem [C]//Advances in Cryptology-Eurocrypt 2003. New York: Springer-Verlag, 2003: 272–293.

    Google Scholar 

  6. Zheng Y L. Digital signcryption or how to achieve cost (Signature &Encryption)_Cost (Signature) + Cost (Encryption) [C]//Advances in Cryptology-Crypto’97. New York: Springer-Verlag, 1997: 165–179.

    Google Scholar 

  7. Baek J, Steinfeld R, Zheng Y L. Formal proofs for the security of signcryption [C]//Public Key Cryptography, PKC 2002. Berlin: Springer-Verlag, 2002: 80–98.

    Chapter  Google Scholar 

  8. Luo M, Wen Y, Zhao H. A certificate-based signcryption scheme [C]//International Conference on Computer Science and Information Technology. Amsterdam: MCCSIS, 2008: 17–23.

    Google Scholar 

  9. Lu Y, Li J. Certificate-based signcryption: Security model and efficient construction [EB/OL]. [2011-01-15]. http://eprint.iacr.org/2011/542.pdf.

  10. Li J, Huang X, Hong M, et al. Certificate-based signcryption with enhanced security features [J]. Computers and Mathematics with Applications, 2012, 64(6): 1587–1601.

    Article  Google Scholar 

  11. Boneh D, Boyen X. Short signatures without random oracles [C]//Advances in Cryptology Eurocrypt 2004. New York: Springer-Verlag, 2004: 56–73.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiyuan Liu.

Additional information

Foundation: Supported in part by the National Natural Science Foundation of China (60903196, 61272451, 61173154) and the Natural Science Foundation of Hubei Province (2013CFB039)

Biography: LIU Zhiyuan, male, Ph.D., Associate professor, research direction: information security and cloud computing security.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Z., Chen, J. A signcryption scheme based on self-certified cryptography. Wuhan Univ. J. Nat. Sci. 19, 169–172 (2014). https://doi.org/10.1007/s11859-014-0996-2

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-014-0996-2

Key words

CLC number

Navigation