Identity based public verifiable signcryption scheme

  • Authors:
  • S. Sharmila Deva Selvi;S. Sree Vivek;C. Pandu Rangan

  • Affiliations:
  • Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India;Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India;Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, India

  • Venue:
  • ProvSec'10 Proceedings of the 4th international conference on Provable security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Signcryption as a cryptographic primitive that offers both confidentiality and authentication simultaneously. Generally, in signcryption schemes, the message is hidden and thus the validity of the signcryption can be verified only after the unsigncryption process. Thus, a third party will not be able to verify whether the signcryption is valid or not. Signcryption schemes that allow any one to verify the validity of signcryption without the knowledge of the message are called public verifiable signcryption schemes. Third party verifiable signcryption schemes allow the receiver of a signcryption, to convince a third party that the signcryption is valid, by providing some additional information along with the signcryption. This information can be anything other than the receiver's private key and the verification may or may not require the exposure of the corresponding message. This paper shows the security weaknesses in two such existing schemes namely [14] and [4]. The scheme in [14] is Public Key Infrastructure (PKI) based scheme and the scheme in [4] is an identity based scheme. More specifically, [14] is based on elliptic curve digital signature algorithm (ECDSA). We also, provide a new identity based signcryption scheme that provides both public verifiability and third party verification. We formally prove the security of the newly proposed scheme in the random oracle model.