Advanced Search
Volume 31 Issue 7
Dec.  2010
Turn off MathJax
Article Contents
Chen Yong-gang, Jia Chun-fu, Lü Shu-wang. An Efficient Signcryption Scheme Based on CPK[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1753-1757. doi: 10.3724/SP.J.1146.2008.01113
Citation: Chen Yong-gang, Jia Chun-fu, Lü Shu-wang. An Efficient Signcryption Scheme Based on CPK[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1753-1757. doi: 10.3724/SP.J.1146.2008.01113

An Efficient Signcryption Scheme Based on CPK

doi: 10.3724/SP.J.1146.2008.01113
  • Received Date: 2008-09-08
  • Rev Recd Date: 2009-01-12
  • Publish Date: 2009-07-19
  • In this paper, a new signcryption scheme called CPK-SC is proposed based on Combined Public Key (CPK) to resolve the authentication and non-repudiation problem. CPK-SC discards the pairings and solves the restriction that the traditional identity-based signcryption schemes can only deal with fixed length messages by introduction symmetric cryptography algorithm. CPK-SC spends fewer computations and produces shorter ciphertext, which can be widely used in the environment of computation and communication resource constrained, such as mobile ad-hoc network. In the random oracle model, the security of CPK-SC is tightly related to the Decision Diffie-Hellman (DDH) assumption.
  • loading
  • Zheng Y. Digital signcryption or how to achieve cost(signature encryption) cost (signature)+cost(encryption)[C][J].Advances in Cryptology-Crypto9.1997, LNCS 1294:165-179[2]Malone-Lee J. Identity based signcryption. cryptology ePrintarchive[R]. Report 2002/098, IACR, 2002.[3]南湘浩, 陈钟. 网络安全技术概论. 北京: 国防工业出版社,2003, 第2 章.Nan Xiang-hao and Chen Zhong. A Profile to NetworkSecurity Techniques[M]. Beijing: National Defence IndustryPress, 2003, Chapter 2.[4]Chen H Y, L S W, and Liu Z H, et al.. An identity-basedsigncryption scheme with short ciphertext from pairings[C].Emerging Directions in Embedded and UbiquitousComputing workshops 2006, 2006, LNCS 4097: 342-351.[5]Barbosa M and Farshim P. Certificateless signcryption[C].ACM Symposium on Information, Computer andCommunications Security, Tokyo, Japan. ACM, 2008:369-372.[6]Li F and Yu Y. An efficient and provably secure ID-basedthreshold signcryption scheme[C]. International conferenceon communications, circuits and systems. Xiamen, China,2008: 488-492.[7]Ren Y L and Gu D W. Efficient identity based signature/signcryption scheme in the standard model[C]. The 1thInternational Symposium on Data, Privacy and E-Commerce.Chengdu, China, 2007: 133-137.[8]Libert B and Quisquater J J. New identity based signcryptionschemes from pairings[C]. IEEE Information TheoryWorkshop. Paris, France, 2003: 155-158.[9]Ma C S. Efficient short signcryption scheme with publicverifiability[C]. Inscrypt 2006, 2006, LNCS 4318: 118-129.[10]Chen Y G.[J].Jia C F, and L S W, et al.. Signature schemewith arbitrary length message recovery in combined publickey[C]. The 4th International conference on Mobile Ad-hocand Sensor Networks. Wuhan, China.2008,:-[11]Zhong X, Dai G Z, and Yang D M. An efficient online/offlinesigncryption scheme for MANET [C]. IEEE AdvancedInformation Networking and Applications Workshops.Ontario, Canada, 2007: 171-176.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3654) PDF downloads(858) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return