skip to main content
10.1145/1368310.1368364acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

Certificateless signcryption

Published:18 March 2008Publication History

ABSTRACT

Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and digital signatures, offering better overall performance and security. In this paper, we introduce the notion of certificateless signcryption and present an efficient construction which guarantees security under insider attacks, and therefore provides forward secrecy and non-repudiation.

References

  1. S. S. Al-Riyami and K. G. Paterson. Certificateless Public-Key Cryptography. Advances in Cryptology - ASIACRYPT 2003, LNCS 2894:452--473. Springer-Verlag, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. H. An, Y. Dodis and T. Rabin. On the Security of Joint Signature and Encryption. Advances in Cryptology - EUROCRYPT 2002, LNCS 2332:83--107. Springer-Verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Z. Cheng and R. Comley. Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/012. 2005.Google ScholarGoogle Scholar
  4. A. W. Dent. A Survey of Certificateless Encryption Schemes and Security Models. Cryptology ePrint Archive, Report 2006/211. 2006.Google ScholarGoogle Scholar
  5. X. Huang, W. Susilo, Y. Mu and F. Zhang. On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Cryptology and Network Security - CANS 2005, LNCS 3810:13--25. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Libert and J.-J. Quisquater. On Constructing Certificateless Cryptosystems from Identity-Based Encryption. Public Key Cryptography 2006 - PKC 2006, LNCS 3958:474--490. Springer-Verlag, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Libert and J.-J. Quisquater. The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004/102. 2004.Google ScholarGoogle Scholar
  8. Z. Zhang, D. S. Wong, J. Xu and D. Feng. Certificateless Public-Key Signature: Security Model and Efficient Construction. 4th International Conference on Applied Cryptography and Network Security - ACNS 2006, LNCS 3989:293--308. Springer-Verlag, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Zheng. Digital Signcryption or How to Achieve Cost(Signature & Encryption) <<< Cost(Signature) + Cost(Encryption). Advances in Cryptology - CRYPTO 97, LNCS 1294:165--179, Springer-Verlag, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
    March 2008
    399 pages
    ISBN:9781595939791
    DOI:10.1145/1368310

    Copyright © 2008 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 March 2008

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    Overall Acceptance Rate418of2,322submissions,18%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader