An E cient Scheme for Secure Message Transmission using Proxy Signcryption
نویسندگان
چکیده
Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf We present a proxy signature scheme that combines the functionality of proxy signing and en cryption This proxy signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not serially linked via a ses sion key to provide authenticity and integrity Use of a proxy agent to perform signature function is desirable for applications that are expected to support computing devices with low computational power and storage capacities Integration of encryption functionality to provide secrecy at no additional cost to the proxy signature generation is an e cient means by which to support the class of applications targeted by this research work such as e commerce using mobile computing and communication
منابع مشابه
An Eecient Scheme for Secure Message Transmission Using Proxy-signcryption
Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf. We present a proxy signature scheme that combines the functionality of proxy signing and en-cryption. This proxy-signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not seriall...
متن کاملAn Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Secure multicast communication has application in growing number of applications. Forward secrecy is of prime importance and insures message con dentiality even long-term private key compromised. We present an e¢ cient construction of multi message multi receiver signcryption with forward secrecy on elliptic curves. It provides con dentiality, integrity, authenticity, non-repudiation, public ve...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملA Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organi...
متن کاملSigncryption with Proxy Re-encryption
Con dentiality and authenticity are two of the most fundamental problems in cryptography. Many applications require both condentiality and authenticity, and hence an e cient way to get both together was very desirable. In 1997, Zheng proposed the notion of signcryption , a single primitive which provides both con dentiality and authenticity in a way that's more e cient than signing and encrypti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006