TY - GEN
T1 - Signature-encryption Scheme
T2 - 2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012
AU - Bao, Haiyong
AU - Xie, Mande
AU - Cao, Zhenfu
AU - Hong, Shanshan
PY - 2012
Y1 - 2012
N2 - Mobile communication technologies have been widely utilized in daily lives, many low-computing-power and weakly-structured-storage devices have emerged, such as PDA, cell phones and smart cards, etc. How to solve the security problems in such devices has become a key problem in secure mobile communication. In this paper, we would like to propose an efficient signature-encryption scheme. The security of the signature part is not loosely related to Discrete Logarithm Problem (DLP) assumption as most of the traditional schemes but tightly related to the Decisional Diffie-Hellman Problem (DDHP) assumption in the Random Oracle Models. Different from the existing solutions, our scheme introduces a trusted agent of the receiver who can filter the "rubbish" messages beforehand. Thus, with high efficiency in computation and storage, it is particularly suitable for the above mobile devices with severely constrained resources and can satisfy the security requirements of mobile computations.
AB - Mobile communication technologies have been widely utilized in daily lives, many low-computing-power and weakly-structured-storage devices have emerged, such as PDA, cell phones and smart cards, etc. How to solve the security problems in such devices has become a key problem in secure mobile communication. In this paper, we would like to propose an efficient signature-encryption scheme. The security of the signature part is not loosely related to Discrete Logarithm Problem (DLP) assumption as most of the traditional schemes but tightly related to the Decisional Diffie-Hellman Problem (DDHP) assumption in the Random Oracle Models. Different from the existing solutions, our scheme introduces a trusted agent of the receiver who can filter the "rubbish" messages beforehand. Thus, with high efficiency in computation and storage, it is particularly suitable for the above mobile devices with severely constrained resources and can satisfy the security requirements of mobile computations.
KW - DDH problem
KW - Mobile computation
KW - Signature-encryption
UR - https://www.scopus.com/pages/publications/84869783145
U2 - 10.4028/www.scientific.net/AMR.546-547.1415
DO - 10.4028/www.scientific.net/AMR.546-547.1415
M3 - 会议稿件
AN - SCOPUS:84869783145
SN - 9783037854518
T3 - Advanced Materials Research
SP - 1415
EP - 1420
BT - Electrical Insulating Materials and Electrical Engineering
Y2 - 25 May 2012 through 27 May 2012
ER -