Efficient Distributed Signcryption Scheme as Group Signcryption

  • DongJin Kwak
  • SangJae Moon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2846)

Abstract

The existing distributed signcryption is designed for distributing a signcrypted message to a designated group. However, it does not provide confidentiality of sender ID and its extension to a group signcryption has certain weakness. This study solves the weakness and extends to an efficient group signcryption. In addition, the proposed distributed signcryption provides with sender ID confidentiality. The extension to a group signcryption is more efficient in computational load than the existing scheme. Moreover, the group manager doesn’t need to keep and generate his group member’s secret information. It can enhance the strength of security in the protocol.

Keywords

Signcryption Group signature Public-key Cryptography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [AT00]
    Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255–270. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. [BD98]
    Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55–59. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. [BS01]
    Bresson, E., Stern, J.: Efficient revocation in group signatures. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 190–206. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. [CS97]
    Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)Google Scholar
  5. [DSS]
    National Institute of Standards and Technology, Digital Signature Standard. Federal Information Processing Standards Publication FIPS PUB 186 U.S. Department of Commerce (1994)Google Scholar
  6. [ElGa]
    ElGamal, T.: A public-key cryptosystmes and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)MATHCrossRefMathSciNetGoogle Scholar
  7. [KM02]
    Kwak, D., Ha, J., Lee, H., Kim, H., Moon, S.: A WTLS handshake protocol with user anonymity and forward secrecy. In: Lee, J.-Y., Kang, C.-H. (eds.) CIC 2002. LNCS, vol. 2524, pp. 219–230. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. [LM00]
    Lee, K., Moon, S.: AKA protocol for mobile communications. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 400–411. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. [LW02]
    Lyuu, Y., Wu, M.: Convertible Group Undeniable Signatures. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 48–61. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. [MN99]
    Mu, Y., Varadharajan, V., Nguyen, K.Q.: Delegated decryption. In: Walker, M. (ed.) Cryptography and Coding 1999. LNCS, vol. 1746, pp. 258–269. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  11. [MOV]
    Manezes, A.J., van Oorshot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)Google Scholar
  12. [MV00]
    Mu, Y., Varadharajan, V.: Distributed signcryption. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 155–164. Springer, Heidelberg (2000)Google Scholar
  13. [RSA]
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)MATHCrossRefMathSciNetGoogle Scholar
  14. [Zhe1]
    Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) < < cost(signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  15. [Zhe2]
    Zheng, Y.: Signcryption and its application in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 291–312. Springer, Heidelberg (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • DongJin Kwak
    • 1
  • SangJae Moon
    • 1
  1. 1.School of Electrical Eng. & Computer ScienceKyungpook National Univ.Korea

Personalised recommendations