Affiliation:
1. Command College of the Chinese Armed Police Force
Abstract
Public verifiability in signcryption achieves public verification of signature by a trustable third party; it ensures the reliability and secure parity of signcryption scheme. In the paper, we analyzed the public verification algorithm in signcryption and presented signcryption scheme without verifiability based on discrete logarithm problem as a comparison. Signcryption without verifiability satisfies the basic requirements of authenticated encryption; it can achieve secret message transmission and identity authentication in a single protocol. But the signcryption sender can cheat in the protocol with forged information for lack of supervision by public verification. Then we presented an improved signcryption scheme with public verifiability, in the scheme signcryption message is generated with private key of message sender and other public parameters, any trustable third party can verify the signcryption without disclosing private key or secret parameters. Besides, the attack on the signcryption and secret parameters via public verification data is computationally infeasible. The scheme reinforces the security and reliability of signcryption and effectively improves its efficiency for engineering application.
Publisher
Trans Tech Publications, Ltd.
Reference32 articles.
1. Zheng Y L. Signcryption and its application in efficient public key solution [A]. ISW'97[C]. Berlin, Heidelberg, New York: Springer-Verlag, 1998, 291-312.
2. William Stallings. Cryptography and Network security Principles and Practice [M]. New Jersey: Prentice Hall Inc. Copyright, (1999).
3. Roberto Maria Avanzi. Aspects of Hyper-elliptic Curves over Large Prime Fields in Software Implementations [A], International Association for Cryptology Research 2004[C], Berlin, Heidelberg, New York: Springer-Verlag, 2004, 148~162.
4. Changshe Ma, Kefei Chen. Publicly verifiable authenticated encryption [J], Electronics Letters, 2003, 39(3): 281~282.
5. Shin J, Lee K and Shin K. New DSA-verifiable signcryption schemes [A], ICICS' 02[C], Berlin, Heidelberg, New York: Springer-Verlag, 2003, 35~47.