An Eecient Scheme for Secure Message Transmission Using Proxy-signcryption

نویسندگان

  • Chandana Gamage
  • Jussipekka Leiwo
  • Yuliang Zheng
چکیده

Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf. We present a proxy signature scheme that combines the functionality of proxy signing and en-cryption. This proxy-signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not serially linked via a session key to provide authenticity and integrity. Use of a proxy agent to perform signature function is desirable for applications that are expected to support computing devices with low computational power and storage capacities. Integration of encryption functionality to provide secrecy at no additional cost to the proxy signature generation is an eecient means by which to support the class of applications targeted by this research work such as e-commerce using mobile computing and communication devices.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

An E cient Scheme for Secure Message Transmission using Proxy Signcryption

Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf We present a proxy signature scheme that combines the functionality of proxy signing and en cryption This proxy signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not serially ...

متن کامل

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organi...

متن کامل

Another Improved Set : Slim Set

| In order to improve the eeciency of the Secure Electronic Transaction (SET) protocol, Hanaoka et al. proposed a light weight version of the SET protocol, called \LITESET"at ACISP '98. They claimed that LITESET has about 50% reduction in computational time and about 80% reduction in communication overhead by using a signcryp-tion scheme. We propose another way to construct an eecient SET proto...

متن کامل

Notes on Proxy Signcryption and Multi-proxy Signature Schemes

Proxy signcrytipn scheme allows an original signer to delegate his signing power to a proxy such that the latter can signcrypt a message on behalf of the former. Recently, Lin et al. proposed a proxy signcryption with CCA and CMA security. In this work, we indicate that the Lin et al.’s proxy signcryption scheme does not hold the security of indistinguishability against adaptive chosen-cipherte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998