Advanced Search
Volume 30 Issue 3
Dec.  2010
Turn off MathJax
Article Contents
Yu Yong, Yang Bo, Li Fa-gen, Sun Ying. An ID-based Proxy Signcryption Scheme with Fast Revocation[J]. Journal of Electronics & Information Technology, 2008, 30(3): 672-675. doi: 10.3724/SP.J.1146.2006.01396
Citation: Yu Yong, Yang Bo, Li Fa-gen, Sun Ying. An ID-based Proxy Signcryption Scheme with Fast Revocation[J]. Journal of Electronics & Information Technology, 2008, 30(3): 672-675. doi: 10.3724/SP.J.1146.2006.01396

An ID-based Proxy Signcryption Scheme with Fast Revocation

doi: 10.3724/SP.J.1146.2006.01396 cstr: 32379.14.SP.J.1146.2006.01396
  • Received Date: 2006-09-14
  • Rev Recd Date: 2007-05-15
  • Publish Date: 2008-03-19
  • Proxy signcryption schemes allow an original signcrypter to delegate his signcryption rights to a proxy signcrypter. However, the existing proxy signcryption schemes have the defect that can not solve the proxy revocation problem, that is, how to revoke the delegated signcryption rights of a proxy signcrypter. Based on the bilinear pairings, a new identity-based proxy signcryption scheme is proposed in this paper. A SEcurity Mediator (SEM) is introduced in the scheme to help a proxy signcrypter to generate valid proxy signcryptions, to examine whether a proxy signcrypter signcrypts messages according to the warrant, and to check the revocation of a proxy signcrypter. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signcryption scheme. Moreover, a proxy signcrypter must cooperate with the SEM to generate a valid proxy signcryption, which makes the new scheme has an effective and fast proxy revocation.
  • loading
  • Mambo M, Usuda K, and Okamoto E. Proxy signature:Delegation of the power to sign message[J]. IEICE Tran. onFundam, 1996, E79-A(9): 1338-1353.[2]Lee B.[J].Kim H, and Kim K. Strong proxy signature and itsapplications[C]. Proc of SCIS01, Oiso, Japan.2001,:-[3]Zheng Y. Digital signcryption or how to achieve cost(signature encryption cost (signature)+cost(encryption)[C]. Proc of CRYPTO97, Berlin: Springer-Verlag, 1997, LNCS 1294.: 165-179.[4]Gamage C, Leiwo J, and Zheng Y. Encrypted messageauthentication by firewalls[C][J].Proc of PKC99, Berlin:Springer-Verlag.1999, LNCS 1560:69-81[5]陈伟东,冯登国. 签密方案在分布式协议中的应用[J]. 计算机学报, 2005, 28(9): 1421-1430.Chen W D and Feng D G. Some applications of signcryptionschemes to distributed protocols[J]. Chinese Journal ofComputers, 2005, 28(9): 1421-1430.[6]Shamir A. Identity-based cryptosystems and signatureschemes[C][J].Proc of CRYPTO84, Berlin: Springer-Verlag.1984, LNCS 196:47-53[7]Boneh D and Franklin M. Identity-based encryption from theweil pairing[C]. Proc of CRYPTO 2001, Berlin: Springer-Verlag, 2001, LNCS 2139: 213-229.[8]Gamage C, Leiwo J, and Zheng Y. An efficient scheme forsecure message transmission using proxy signcryption [C].Proc of 22nd Australasian computer science conference,Berlin: Springer-Verlag, 1999: 420-431.[9]Li X and Chen K. Identity based proxy signcryption shemefrom pairings[C]. Proc of the 2004 IEEE Internationalconference on services computing, Shanghai, 2004: 494-497.[10]Wang Q and Cao Z F. Two proxy signcryption schemes frombilinear pairings[C]. Proc of CANS 2005, Berlin: Springer-Verlag, 2005, LNCS 3810: 161-171.[11]Boneh D, Ding X, and Tsudik G, et al.. A method for fastrevocation of public key certificates and securitycapabilities[C]. Proc of the 10th USENIX Security Symposium,Washington D. C, 2001: 297-308.[12]Libert B and Quisquater J J. A new identity basedsigncryption schemes from pairings[C]. Proc of IEEEinformation theory workshop, Paris, France, 2003: 155-158.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3362) PDF downloads(729) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return