Signature-encryption Scheme: A novel solution to mobile computation

Haiyong Bao, Mande Xie, Zhenfu Cao, Shanshan Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Mobile communication technologies have been widely utilized in daily lives, many low-computing-power and weakly-structured-storage devices have emerged, such as PDA, cell phones and smart cards, etc. How to solve the security problems in such devices has become a key problem in secure mobile communication. In this paper, we would like to propose an efficient signature-encryption scheme. The security of the signature part is not loosely related to Discrete Logarithm Problem (DLP) assumption as most of the traditional schemes but tightly related to the Decisional Diffie-Hellman Problem (DDHP) assumption in the Random Oracle Models. Different from the existing solutions, our scheme introduces a trusted agent of the receiver who can filter the "rubbish" messages beforehand. Thus, with high efficiency in computation and storage, it is particularly suitable for the above mobile devices with severely constrained resources and can satisfy the security requirements of mobile computations.

Original languageEnglish
Title of host publicationElectrical Insulating Materials and Electrical Engineering
Pages1415-1420
Number of pages6
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012 - Shenyang, Liaoning, China
Duration: 25 May 201227 May 2012

Publication series

NameAdvanced Materials Research
Volume546-547
ISSN (Print)1022-6680

Conference

Conference2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012
Country/TerritoryChina
CityShenyang, Liaoning
Period25/05/1227/05/12

Keywords

  • DDH problem
  • Mobile computation
  • Signature-encryption

Fingerprint

Dive into the research topics of 'Signature-encryption Scheme: A novel solution to mobile computation'. Together they form a unique fingerprint.

Cite this