Skip to main content

Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability

  • Conference paper
Networking and Mobile Computing (ICCNMC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Included in the following conference series:

Abstract

Li and Chen proposed an identity based proxy-signcryption scheme which is based on the Libert and Quisquater’s identity based signcryption scheme recently. However, we demonstrate that their scheme does not satisfy the strong unforgeability and forward security in the strict sense. Furthermore, establishing a secure channel has much influence on their scheme. Based on the new ID-based signcryption scheme proposed by Chow et al, an efficient forward secure and public verifiable identity based proxy-signcryption scheme without the secure channel is proposed. The proposed scheme overcomes the weakness of Li-Chen scheme. The security and performance of the scheme are also analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

  2. Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Lee, B., Kim, H., Kim, K.: Strong Proxy Signature and its Applications. In: SCIS 2001. LNCS, vol. 2119, pp. 603–608. Springer, Heidelberg (2001)

    Google Scholar 

  4. Li, X., Chen, K.: Identity Based Proxy-Signcryption Scheme from Pairings. In: Proceedings of the IEEE International Conference on Services Computing (SCC 2004), pp. 494–497 (2004)

    Google Scholar 

  5. Libert, B., Quisquater, J.: New Identity Based Signcryption Schemes from Pairings. In: IEEE Information Theory Workshop, pp. 155–158 (2003)

    Google Scholar 

  6. Boyen, X.: Multipurpose Identity-Based Signcryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, M., Li, H., Liu, Z. (2005). Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_103

Download citation

  • DOI: https://doi.org/10.1007/11534310_103

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics