|Table of Contents|

New Efficient Signcryption Scheme

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2006年06期
Page:
739-741
Research Field:
Publishing date:
2006-12-30

Info

Title:
New Efficient Signcryption Scheme
Author(s):
LIU Chun-gangZHOU Ting-xian
Communications Research Center,Harbin Institute of Technology,Harbin 150001,China
Keywords:
ID-based cryptography signcryption b ilinear pa irings
PACS:
TN918
DOI:
-
Abstract:
S igncryption comb ines d ig ital signature and encrypt ion, but the research abou t the eff-i cient Ident ity based signcryption schem es is diff icul.t For th is, an efficient ID-based signcryption scheme w hich uses b ilinear pa irings is proposed. In the scheme, ident ity message is imported into signature key, and signa ture conta insmessage. A s the scheme can separate the signature verif ication from m essage recovery, it can be applied in mobile E-business scenario, such as filtrat ion o f bad instantmessages ofmobile equ ipment.

References:

[ 1] Sham ir A. Identity-based cryptosystem s and signature schem es [ A ] . Advances in C ryto logy-Cryp to . 84, LNCS 196 [ C ]. Berlin: Spr inge r-Ver lag, 1984, 47 - 53.
[ 2] Cha J C, Cheon JH. An identity-based signature from gap d iffie-he llm an g roups[ A] . Public Key Cryptog raphy- PKC '2003 ( LNCS 2567) [ C ]. Berlin: Spr ing er- Verlag, 2003. 18- 30.
[ 3] Boneh D, Lynn B, Shacham H. Short signatures from the we il pa iring [ A ] . Pro c Advances in Crypto logy- Asiacrypt 2001 [ C ]. Go ld Coast, Queensland, Austra lia: [ s. n. ], 2001. 514- 532.
[ 4] Cha J C, Cheon J H. An Identity-based signature from Gap D iffie-H ellm an groups [ EB /OL]. http: / / epr int. iacr. org /2002 /0184, 2002- 02- 15.
[ 5] Pate rson K G. ID-based signatures from pa irings on e-l liptic curves [ J ]. E lectron Le tt, 2002, 38 ( 18 ): 1 025- 1 026.
[ 6 ] H ess F. E ffic ient identity based signature schem es based on pa irings[ A]. Advances in Crypto logy-A siacrypt' 2001, LNCS 2595[ C ]. Berlin: Spr ing er-Ve rlag, 2003. 310- 324.
[ 7] Zheng Y. D ig ita l s ignc ryption or how to ach ieve cost ( signature& encryption )《cost ( signautre ) - + - cost( encryption) [ A ]. Advance in Crypto logy CRTPTO97( LNCS1294) [ C]. Ge rm any: Springer-Ver lag, 1997. 165- 179.
[ 8] Zheng Y, Im ai H. E ffic ient signcryption schem es on e lliptic curves[ J]. In fo rm Process Letters, 1998, 68 ( 6): 227- 233.
[ 9] Lee JM. Signcryption w ith Non-Repudiation [ R ]. B risto :l Departm ent o f Computer Science, Un iv ers ity o f Br isto,l 2002.
[ 10 ] M a lone-Lee J. Identity based signcryption [ EB / OL] . http: / /eprint. iacr. o rg /2002/098, 2002 - 07- 19.
[ 11] L ibert B, Quisquate r J-J. New identity based signcryption schem es from pa ir ing s [ EB /OL] . http: / / eprin t. iacr. org /2003 /023, 2003- 02- 24.

Memo

Memo:
-
Last Update: 2006-12-30