2014 | OriginalPaper | Buchkapitel
Identity-Based Transitive Signcryption
verfasst von : Shuquan Hou, Xinyi Huang, Li Xu
Erschienen in: Network and System Security
Verlag: Springer International Publishing
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Transitive signatures allow a signer to authenticate a graph in such a way that given two signatures on adjacent edges (
i
,
j
) and (
j
,
k
), anyone with public information can compose a signature on edge (
i
,
k
). In all existing transitive signature schemes, to prevent signature exposure, a secure channel is required between the signer and the recipient to transfer the signature. To eliminate this need, in this paper we introduce a new notion called Identity-Based Transitive Signcryption (IBTSC) by integrating transitive signatures and identity-based signcryption. We present formal definitions and a concrete construction of IBTSC. In the random oracle model, we prove that the proposed IBTSC scheme is secure in the proposed models of confidentiality and unforgeability for IBTSC. Our design not only preserves all desirable properties of transitive signatures but also prevents signature exposure in an efficient way.