Abstract
Signcryption scheme is one of the useful tools for secure communication where authenticity and confidentiality are simultaneously required. Now, mobile devices are more and more widely used for communication, and thus it is desirable to design a scheme suitable to mobile applications. In this paper, we propose a signcryption scheme which is efficient enough to be implemented on mobile devices. In our scheme, we need only one multiplication in an online phase, and thus a signcryptor can generate a signcryptext very efficiently in the online phase. Moreover, the size of signcryptext is very short compared with exsiting schemes, and thus our scheme is very efficient in terms of communication overhead. The security of our signcryption scheme is proven in the random oracle model.
Similar content being viewed by others
References
Even S, Goldreich O, Micali S. On-line/off-line digital signatures. J Cryptology, 1996, 9: 35–67
Lin D R, Wang C I, Guan D J. An efficiently online/offline signcryption for firewall. In: Proceedings of 2008 8th International Conference on Intelligent Systems Design and Applications, Kaohsiung, 2008. 472–478
Sun D, Mu Y, Susilo W. A generic construction of identity-based online/offline signcryption. In: Proceedings of 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, Sydney, 2008. 707–712
Xu Z, Dai G, Yang D. An efficient online/offline signcryption scheme for MANET. In: Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, Ontario, 2007. 171–176
Shamir A, Tauman Y. Improved online/offline signature schemes. In: Proceedings of Advances in Cryptology, 21st Annual International Cryptology Conference, Santa Barbara, 2001. LNCS 2139. 355–367
Ma C. Efficient short signcryption scheme with public verifiability. In: Proceedings of Information Security and Cryptology, Beijing, 2006. LNCS 4318. 118–129
Tan C H. Forgery of provable secure short signcryption scheme. IEICE Trans Fundamentals, 2007, E90-A: 1879–1880
Bao F, Deng R H. A signcryption scheme with signature directly verifiable by public key. In: Proceedings of Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, Pacifico Yokohama, 1998. LNCS 1431. 55–59
Li C K, Yang G, Wong D S, et al. An efficient signcryption scheme with key privacy. In: Proceedings of 2007 European PKI Workshop: Theory and Practice, Palma de Mallorca, 2007. LNCS 4582. 78–93
Yi R X, Hua Q Z, Geng Y. Provably secure identity-based aggregate signcryption scheme. ETRI J, 2012, in press
Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) _ cost(signature) + cost(encryption). In: Proceedings of Advances in Cryptology, 17th Annual International Cryptology Conference, Santa Barbara, 1997. LNCS 1294. 165–179
Zheng Y, Imai H. How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett, 1998, 68: 227–233
Krawczyk H, Rabin T. Chameleon signatures. In: Proceedings of Network and Distributed System Security Symposium, San Diego, 2000. 143–154
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Youn, TY., Hong, D. Signcryption with fast online signing and short signcryptext for secure and private mobile communication. Sci. China Inf. Sci. 55, 2530–2541 (2012). https://doi.org/10.1007/s11432-012-4635-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-012-4635-2