An E cient Scheme for Secure Message Transmission using Proxy Signcryption

نویسندگان

  • Chandana Gamage
  • Jussipekka Leiwo
  • Yuliang Zheng
چکیده

Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf We present a proxy signature scheme that combines the functionality of proxy signing and en cryption This proxy signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not serially linked via a ses sion key to provide authenticity and integrity Use of a proxy agent to perform signature function is desirable for applications that are expected to support computing devices with low computational power and storage capacities Integration of encryption functionality to provide secrecy at no additional cost to the proxy signature generation is an e cient means by which to support the class of applications targeted by this research work such as e commerce using mobile computing and communication

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Eecient Scheme for Secure Message Transmission Using Proxy-signcryption

Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf. We present a proxy signature scheme that combines the functionality of proxy signing and en-cryption. This proxy-signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not seriall...

متن کامل

An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves

Secure multicast communication has application in growing number of applications. Forward secrecy is of prime importance and insures message con…dentiality even long-term private key compromised. We present an e¢ cient construction of multi message multi receiver signcryption with forward secrecy on elliptic curves. It provides con…dentiality, integrity, authenticity, non-repudiation, public ve...

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organi...

متن کامل

Signcryption with Proxy Re-encryption

Con dentiality and authenticity are two of the most fundamental problems in cryptography. Many applications require both condentiality and authenticity, and hence an e cient way to get both together was very desirable. In 1997, Zheng proposed the notion of signcryption , a single primitive which provides both con dentiality and authenticity in a way that's more e cient than signing and encrypti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006