Sciweavers

Share
PROVSEC
2010
Springer

Identity Based Public Verifiable Signcryption Scheme

9 years 11 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after unsigncrypting the ciphertext. Thus, a third party will not be able to verify whether the ciphertext is valid or not. Signcryption schemes that allow any user to verify the validity of the ciphertext without the knowledge of the message are called public verifiable signcryption schemes. Third Party verifiable signcryption schemes allow the receiver to convince a third party, by providing some additional information along with the signcryption other than his private key with/without exposing the message. In this paper, we show the security weaknesses in three existing schemes [2], [14] and [4]. The schemes in [2] and [14] are in the Public Key Infrastructure (PKI) setting and the scheme in [4] is in the identity based setting. More specifically,...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra
Added 14 Feb 2011
Updated 14 Feb 2011
Type Journal
Year 2010
Where PROVSEC
Authors S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
Comments (0)
books