A secure proxy signcryption scheme based on discrete logarithm problem

Qin Wang, Zhenfu Cao

Research output: Contribution to journalArticlepeer-review

Abstract

A proxy signcryption scheme is useful for applications particularly in distributed computing such as mobile agent applications and mobile communications. In this paper, we first define the security requirements for proxy signcryption scheme. Then we identify the security weaknesses of the proxy signcryption scheme proposed by Gamage, Leiwo, and Zheng. After that, we improve the signcryption scheme proposed by Wang, Bao, Ma, and Chen. Based on the improved scheme, we would like to propose a new proxy signcryption scheme so that all desired security properties are satisfied without a secure channel.

Original languageEnglish
Pages (from-to)567-573
Number of pages7
JournalJournal of Information and Computational Science
Volume3
Issue number3
StatePublished - Sep 2006
Externally publishedYes

Keywords

  • Network security
  • Proxy signature
  • Proxy signcryption
  • Signcryption

Fingerprint

Dive into the research topics of 'A secure proxy signcryption scheme based on discrete logarithm problem'. Together they form a unique fingerprint.

Cite this