Efficient online/offline signcryption without key exposure

نویسندگان

  • Fei Yan
  • Xiaofeng Chen
  • Yinghui Zhang
چکیده

An online/offline signcryption scheme provides confidentiality and authentication simultaneously, and it is particularly suitable for the application of resource-constrained systems. In this paper, we present a key-exposure free online/offline signcryption scheme. In contrast, it seems that all the existing online/offline signcryption schemes based on Shamir-Tauman’s paradigm suffer from the key exposure problem. In the random oracle model, the proposed scheme is proved to be indistinguishable against adaptive chosen-ciphertext attacks (IND-CCA2) and existentially unforgeable against chosen-message attacks (EUF-CMA). Besides, an improved scheme is proposed, which requires none of the recipient’s public information in the offline phase and hence makes practical sense.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Online/Offline Identity-Based Signcryption Revisited

In this paper, we redefine a cryptographic notion called Online/Offline Identity-Based Signcryption. It is an “online/offline” version of identity-based signcryption, where most of the computations are carried out offline while the online part does not require any heavy computations such as pairings or multiplications on elliptic curve. It is particularly suitable for power-constrained devices ...

متن کامل

Identity Based Online/Offline Signcryption Scheme

Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases online and offline phase. Most of the computations are carried out offline (where the message and the receiver identity are unavailable). The online phase does not require any heavy computations like pairing, multiplication on elliptic curves and is very efficient. To the best of o...

متن کامل

Traitor Traceable Signature Scheme

The new signature scheme, t ra i tor traceable signature scheme is presented, which allows the signer to convince any arbiter of the recipient's infringement, if the recipient distributes illegally the signature which he got. We use the techniques of a proof of knowledge of discrete logarithm[l][2], identification of double spender in an off-line electronic cash[3][4], and a signcryption scheme...

متن کامل

Efficient Online/Offline Signcryption Scheme

In this paper, we propose a new signcryption scheme and its online/offline version from pairings. Based on the assumption of k+1 square roots, the scheme is proven, without random oracles, to be secure against the existential forgery under an adaptive chosen-message attack. It is also proven that its IND-CPA security also implies its IND-CCA2 security. A comparison is made with existing schemes...

متن کامل

Integrating Wireless Sensor Networks into Internet Of Things For Security

A secure channel between a sensor node and internet host is created, hence new security challenges arises and wireless sensor networks is integrated into internet of things. We use heterogeneous online/offline signcryption scheme so that secure communication is provided. We use bilinear diffie-hellman inversion problem in random oracle model, it provides indistinguishability against adaptive ch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJGUC

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2013