Abstract
Signcryption is a cryptographic primitive that performs signing and encryption simultaneously, at less cost than is required by the traditional signature-then-encryption approach. In this paper, a new signcryption scheme is proposed for the open problem posed by Zheng, and is based on Secret Sharing technique. The scheme is an “all-in-one” security approach: it provides privacy, authentication, integrity and non-repudiation, all with less computational cost as well as communication overhead. Yet, the scheme is not restricted to any particular cryptosystem and could be designed with any cryptographic cryptosystem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
An, J., Dodis, Y., Rabin, T.: On the Security of Joint Signature and Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83–107. Springer, Heidelberg (2002)
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among notions and analysis of the composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. on Inform. Theory IT-22, 644–654 (1976)
ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. on Inform. Theory IT-31, 469–472 (1985)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
National Institute of Standards and Technology (NIST). FIPS Publication 180: Secure Hash Standards (SHS), May 11 (1993)
Pieprzyk, J., Pointcheval, D.: Parallel Cryptography. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727. Springer, Heidelberg (2003)
Pieprzyk, J., Okamato, E.: Verifiable secret sharing. In: Song, J.S. (ed.) ICISC 1999. LNCS, vol. 1787, pp. 169–183. Springer, Heidelberg (2000)
Rohatchi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: Proc. of 6th ACM conference on computer and communications security (1999)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21, 120–126 (1978)
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Steinfeld, R., Zheng, Y.: A Signcryption scheme based on Integer Factorization. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975, pp. 308–322. Springer, Heidelberg (2000)
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption < < Cost (Signature) + Cost (Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Al-Ibrahim, M. (2003). A Signcryption Scheme Based on Secret Sharing Technique. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive