Browse > Article

An enhanced signcryption protocol for providing for providing forward secrecy  

이경현 (부경대학교 전자컴퓨터정보통신공학부)
조현호 (동부산대학 컴퓨터정보학부)
이준석 (부경대학교 전자계산학과)
Abstract
The signature-then-encryption based on RSA scheme provides forward secrecy, but requires 4 modulo exponentiation operations in total, and the signcryption scheme proposed by Zheng simultaneously fulfills both the functions of digital signature and symmetric key encryption in a logically single step, and with a computational cost significantly smaller than that required by the current standard signature-then-encryption, but it can not provide forward secrecy. In this paper, we propose an enhanced signcryption scheme which can provide forward secrecy with lower computational cost and lower communication overhead comparing with those of the signature-then-encryption based on RSA, and with a similar communication overhead of Zheng's scheme. The proposed scheme can be also easily modified to the direct signature verification scheme by the recipient without using the recipient's private key. Additionally, we suggest a new design protocol with server-supported signatures which solves the CRLs(Certificate Revocation Lists) burden and provides non-repudiation of origin. This protocol with server-supported signatures also can be applied to the original signcryption scheme proposed by Zheng in order to improve security.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Bao and H. Deng, 'A signcryption scheme with signature directly verifiable by public key', Proceeding of Public Key Cryptography (PKC'98), LNCS Vol.1431, pp.55-59, 1998   DOI   ScienceOn
2 N. Asokan, G. Tsudik and M. Waider, 'Server-Supported Signatures', Joumal of Computer Security, Vol.5, No. 1, November 1997
3 Y. Zheng, 'DigitaI signcryption or how to achieve cost(signature and encrypdon)<   DOI   ScienceOn
4 'Proposed Federal Information Proceeding Standard for Digital Signature Standard(DSS)', Federal Register, Vol. 56, No.169 30, 1991
5 T. ElGamal, 'A public key cryptosystem and a signature scheme based on discrete logarithm', IEEE Trans. on Information Theory IT-31, pp. 1995
6 Y. Zheng, 'Signcrypdon and its application in efBcient public key soludons', Proc. of Information Security Workshop(ISW97), LNCS Vol 1396, Springer-Verlag, pp. 291-312, 1998
7 RSA Security Inc. 'http:\\www.rsa.com
8 R. L. Rivest, A. Shamir and L. Adleman, 'A method of obtaining digital signature and public key cryptosystem', ACM Communication, 21 No. 2, pp. 120-126, 1978   DOI   ScienceOn
9 Y. Zheng, 'Compact and unforgeable session key establishment over ATM network', In Proceedings of IEEE INFOCOM'98, pp. 411-418, San Francisco, 1998   DOI
10 이민섭, '현대 암호학', 교우사, 2001
11 A. J. Menezes P. C. van Oorschot and S. A. Vanstone, 'Handbook of Applied Cryptography' 1997