Paper 2010/343

Identity Based Public Verifiable Signcryption Scheme

S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan


Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after unsigncrypting the ciphertext. Thus, a third party will not be able to verify whether the ciphertext is valid or not. Signcryption schemes that allow any user to verify the validity of the ciphertext without the knowledge of the message are called public verifiable signcryption schemes. Third Party verifiable signcryption schemes allow the receiver to convince a third party, by providing some additional information along with the signcryption other than his private key with/without exposing the message. In this paper, we show the security weaknesses in three existing schemes \cite{BaoD98}, \cite{TsoOO08} and \cite{ChowYHC03}. The schemes in \cite{BaoD98} and \cite{TsoOO08} are in the Public Key Infrastructure (PKI) setting and the scheme in \cite{ChowYHC03} is in the identity based setting. More specifically, \cite{TsoOO08} is based on elliptic curve digital signature algorithm (ECDSA). We also, provide a new identity based signcryption scheme that provides public verifiability and third party verification. We formally prove the security of the newly proposed scheme in the random oracle model.

Available format(s)
Public-key cryptography
Publication info
Published elsewhere. Accepted in PROVSEC-2010
Contact author(s)
sharmioshin @ gmail com
ssreevivek @ gmail com
2010-06-18: received
Short URL
Creative Commons Attribution


      author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan},
      title = {Identity Based Public Verifiable Signcryption Scheme},
      howpublished = {Cryptology ePrint Archive, Paper 2010/343},
      year = {2010},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.