Convertible proxy signcryption scheme

Ji Guo Li*, Jian Zhong Li, Zhen Fu Cao, Yi Chen Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature. However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver's benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu's scheme and improved Kim's scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme.

Original languageEnglish
Pages (from-to)209-213
Number of pages5
JournalJournal of Harbin Institute of Technology (New Series)
Volume11
Issue number2
StatePublished - Apr 2004
Externally publishedYes

Keywords

  • Digital signature
  • Nonrepudiation
  • Proxy signature
  • Proxy signcryption

Fingerprint

Dive into the research topics of 'Convertible proxy signcryption scheme'. Together they form a unique fingerprint.

Cite this