Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
ElGamal-like digital signature and multisignature schemes using self-certified public keys
Journal of Systems and Software
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Signcryption Scheme with Signature Directly Verifiable by Public Key
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Formal Proofs for the Security of Signcryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
On the security of a digital signature with message recovery using self-certified public key
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
Two birds one stone: signcryption using RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Fast and proven secure blind identity-based signcryption from pairings
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Hi-index | 0.00 |
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key generator (PKG) can easily impersonate any user at any time without being detected. In this paper we present a pairing-based signcryption scheme using self-certified public keys. In our scheme, users can choose their private keys independently. The public keys of users can be implicitly verified with the subsequent signature verification in a logically single step. A trusted PKG is no longer required. If the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to certificate-based systems.