Improved Signcryption Scheme with Public Verifiability

Signcryption scheme can achieve signature authentication and encryption transmission simultaneously in a single protocol, it effectively prevents mutual cheating in message transmission. In the paper, we analyzed the security threats and system flaws of present signcryption schemes, and presented an improved signcryption scheme with public verifiability based on ECC (Elliptic Curves Cryptosystem). The scheme achieves public verification of signcryption by TTP (Trustable Third Party) without disclosing private key or secret parameters. The scheme avoids the illegal refusal of valid signcryption by TTP, effectively prevents generalized signcryption forgery and coalition attack by message receiver and outer adversaries. The one-way trapdoor function is based on ECDLP (Elliptic Curves Discrete Logarithm Problem), so the algorithms of the scheme take great advantage of the superiority of ECC, such as high efficiency, short key length and etc. The scheme not only reinforces the security and stability of signcryption but also effectively improves the efficiency of signcryption for software and hardware application.

[1]  Ping Wei,et al.  Anonymous Proxy Authorization Signature Scheme with Forward Security , 2008, 2008 International Conference on Computer Science and Software Engineering.

[2]  Rahim Tafazolli,et al.  Genetically modified multiuser detection for code division multiple access systems , 2002, IEEE J. Sel. Areas Commun..

[3]  Ping Wei,et al.  Key management scheme based on (t, n) threshold cryptosystem , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.

[4]  Ueli Maurer,et al.  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.

[5]  Jianhong Zhang,et al.  A Novel Efficient Group Signature Scheme with Forward Security , 2003, ICICS.

[6]  Ramesh Annavajjala,et al.  BER-Optimal Linear Parallel Interference Cancellation for Multicarrier DS-CDMA in Rayleigh Fading , 2007, IEEE Transactions on Communications.

[7]  Rainer A. Rueppel,et al.  Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.

[8]  Xiaoyuan Yang,et al.  BSADF: Blind Signature Based Anonymous Digital Fingerprint , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).

[9]  Yuliang Zheng,et al.  Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.

[10]  David W. Matolak,et al.  Efficient statistical parallel interference cancellation for DS-CDMA in Rayleigh fading channels , 2007, IEEE Transactions on Wireless Communications.

[11]  Kyung-Ah Shim,et al.  New DSA-Verifiable Signcryption Schemes , 2002, ICISC.

[12]  Xiaoyuan Yang,et al.  Threshold Cryptosystem and Its Application in Key Management Scheme , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.

[13]  Changshe Ma,et al.  Publicly verifiable authenticated encryption , 2003 .

[14]  Ping Wei,et al.  Proxy Authorization Signature with Conditional Anonymity and Its Application , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.

[15]  Mitsuo Gen,et al.  Effective genetic approach for optimizing advanced planning and scheduling in flexible manufacturing system , 2006, GECCO.

[16]  Yuanan Liu,et al.  Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance , 2008, IEEE Transactions on Signal Processing.

[17]  Zhang Wei Key Management Scheme for Network Environment Based on Elliptic Curves Cryptosystem , 2004 .

[18]  Min-Shiang Hwang,et al.  A threshold signature scheme for group communications without a shared distribution center , 2004, Future Gener. Comput. Syst..

[19]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..