In this paper, we show the security weaknesses in three existing schemes \cite{BaoD98}, \cite{TsoOO08} and \cite{ChowYHC03}. The schemes in \cite{BaoD98} and \cite{TsoOO08} are in the Public Key Infrastructure (PKI) setting and the scheme in \cite{ChowYHC03} is in the identity based setting. More specifically, \cite{TsoOO08} is based on elliptic curve digital signature algorithm (ECDSA). We also, provide a new identity based signcryption scheme that provides public verifiability and third party verification. We formally prove the security of the newly proposed scheme in the random oracle model.
Category / Keywords: public-key cryptography / Publication Info: Accepted in PROVSEC-2010 Date: received 15 Jun 2010, last revised 15 Jun 2010 Contact author: sharmioshin at gmail com, ssreevivek@gmail com Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20100618:183457 (All versions of this report) Short URL: ia.cr/2010/343 Discussion forum: Show discussion | Start new discussion