Abstract
Li and Chen proposed an identity based proxy-signcryption scheme which is based on the Libert and Quisquater’s identity based signcryption scheme recently. However, we demonstrate that their scheme does not satisfy the strong unforgeability and forward security in the strict sense. Furthermore, establishing a secure channel has much influence on their scheme. Based on the new ID-based signcryption scheme proposed by Chow et al, an efficient forward secure and public verifiable identity based proxy-signcryption scheme without the secure channel is proposed. The proposed scheme overcomes the weakness of Li-Chen scheme. The security and performance of the scheme are also analyzed.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)
Lee, B., Kim, H., Kim, K.: Strong Proxy Signature and its Applications. In: SCIS 2001. LNCS, vol. 2119, pp. 603–608. Springer, Heidelberg (2001)
Li, X., Chen, K.: Identity Based Proxy-Signcryption Scheme from Pairings. In: Proceedings of the IEEE International Conference on Services Computing (SCC 2004), pp. 494–497 (2004)
Libert, B., Quisquater, J.: New Identity Based Signcryption Schemes from Pairings. In: IEEE Information Theory Workshop, pp. 155–158 (2003)
Boyen, X.: Multipurpose Identity-Based Signcryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, M., Li, H., Liu, Z. (2005). Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_103
Download citation
DOI: https://doi.org/10.1007/11534310_103
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)