Paper 2010/343
Identity Based Public Verifiable Signcryption Scheme
S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan
Abstract
Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after unsigncrypting the ciphertext. Thus, a third party will not be able to verify whether the ciphertext is valid or not. Signcryption schemes that allow any user to verify the validity of the ciphertext without the knowledge of the message are called public verifiable signcryption schemes. Third Party verifiable signcryption schemes allow the receiver to convince a third party, by providing some additional information along with the signcryption other than his private key with/without exposing the message. In this paper, we show the security weaknesses in three existing schemes \cite{BaoD98}, \cite{TsoOO08} and \cite{ChowYHC03}. The schemes in \cite{BaoD98} and \cite{TsoOO08} are in the Public Key Infrastructure (PKI) setting and the scheme in \cite{ChowYHC03} is in the identity based setting. More specifically, \cite{TsoOO08} is based on elliptic curve digital signature algorithm (ECDSA). We also, provide a new identity based signcryption scheme that provides public verifiability and third party verification. We formally prove the security of the newly proposed scheme in the random oracle model.
Metadata
- Available format(s)
- PDF PS
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Accepted in PROVSEC-2010
- Contact author(s)
-
sharmioshin @ gmail com
ssreevivek @ gmail com - History
- 2010-06-18: received
- Short URL
- https://ia.cr/2010/343
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/343, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Public Verifiable Signcryption Scheme}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/343}, year = {2010}, url = {https://eprint.iacr.org/2010/343} }