A Strong Designated Verifiable DL Based Signcryption Scheme


Sujata Mohanty, Banshidhar Majhi, Journal of Information Processing Systems Vol. 8, No. 4, pp. 567-574, Dec. 2012  

10.3745/JIPS.2012.8.4.567
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Fulltext:

Abstract

This paper presents a strong designated verifiable signcryption scheme, in which a message is signcrypted by a signcryptor and only a specific receiver, who called a "designated verifier", verifies it using his own secret key. The scheme is secure, as an adversary can not verify the signature even if the secret key of the signer is compromised or leaked. The security of the proposed scheme lies in the complexity of solving two computationally hard problems, namely, the Discrete Logarithm Problem (DLP) and the Integer Factorization Problem (IFP). The security analysis of the scheme has been done and it is proved that, the proposed scheme can withstand an adaptive chosen ciphertext attack. This scheme can be very useful in organizations where there is a need to send confidential documents to a specific recipient. This scheme can also be applicable to real life scenarios, such as, e-commerce applications, e-banking and e-voting.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Mohanty, S. & Majhi, B. (2012). A Strong Designated Verifiable DL Based Signcryption Scheme. Journal of Information Processing Systems, 8(4), 567-574. DOI: 10.3745/JIPS.2012.8.4.567.

[IEEE Style]
S. Mohanty and B. Majhi, "A Strong Designated Verifiable DL Based Signcryption Scheme," Journal of Information Processing Systems, vol. 8, no. 4, pp. 567-574, 2012. DOI: 10.3745/JIPS.2012.8.4.567.

[ACM Style]
Sujata Mohanty and Banshidhar Majhi. 2012. A Strong Designated Verifiable DL Based Signcryption Scheme. Journal of Information Processing Systems, 8, 4, (2012), 567-574. DOI: 10.3745/JIPS.2012.8.4.567.