An efficient signcryption scheme with key privacy

Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

35 Citations (Scopus)

Abstract

In Information Processing Letters 2006, Tan pointed out that the anonymous signcryption scheme proposed by Yang, Wong and Deng (YWD) in ISC 2005 provides neither confidentality nor anonymity. However, no discussion has been made on whether YWD scheme can be made secure. In this paper, we propose a modification of YWD scheme which resolves the security issues of the original scheme without sacrificing its high efficiency and simple design. Indeed, we show that our scheme achieves confidentiality, existential unforgeability and anonymity with more precise reduction bounds. In addition, our scheme further improves the efficiency when compared with YWD, with reduced number of operations for both signcryption and de-signcryption. © Springer-Verlag Berlin Heidelberg 2007.
Original languageEnglish
Title of host publicationPublic Key Infrastructure
Subtitle of host publication4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings
EditorsJavier Lopez, Pierangela Samarati, Josep L. Ferrer
Place of PublicationBerlin, Heidelberg
PublisherSpringer 
Pages78-93
ISBN (Electronic)978-3-540-73408-6
ISBN (Print)9783540734079
DOIs
Publication statusPublished - 2007
Event4th European Public Key Infrastructure Workshop: Theory and Practice (EuroPKI 2007) - Palma de Mallorca, Spain
Duration: 28 Jun 200730 Jun 2007

Publication series

NameLecture Notes in Computer Science
Volume4582
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th European Public Key Infrastructure Workshop: Theory and Practice (EuroPKI 2007)
Country/TerritorySpain
CityPalma de Mallorca
Period28/06/0730/06/07

Research Keywords

  • Ciphertext anonymity
  • Gap Diffie-Hellman
  • Key privacy
  • Signcryption

Fingerprint

Dive into the research topics of 'An efficient signcryption scheme with key privacy'. Together they form a unique fingerprint.

Cite this