Abstract
Signcryption, first proposed by Zheng [4, 5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step, and with a computational cost siginficantly lower than that needed by the traditional signature-then-encryption approach. In Zheng's scheme, the signature verification can be done either by the recipient directly (using his private key) or by engaging a zero-knowledge interative protocol with a third party, without disclosing recipient's private key. In this note, we modify Zheng's scheme so that the recipient's private key is no longer needed in signature verification. The computational cost of the modified scheme is higher than that of Zheng's scheme but lower than that of the signature-then-encryption approach.
Preview
Unable to display preview. Download preview PDF.
References
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, IT-31(4):469–472, 1985.
H. Petersen and M. Michels, “Cryptanalysis and improvement of signcryption schemes”, to appear in IEE Computers and Digital Techniques, 1998.
C. P. Schnorr, “Efficient identification and signature for smart cards”, Advances in Cryptology — CRYPTO'89, LNCS 435, Springer-Verlag, pp. 239–251.
Y. Zheng, “Digital signcryption or how to achieve cost (signature and encryption) ¡¡ cost(signature) + cost(encryption)”, In Advances in Cryptology — CRYPTO'97, LNCS 1294, Springer-Verlag, pp. 165–179, 1997.
Y. Zheng, “Signcryption and its application in efficient public key solutions”, Pre-Proceedings of Information Security Workshop(ISW'97), pp. 201–218, to be published in LNCS by Springer-Verlag.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bao, F., Deng, R.H. (1998). A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds) Public Key Cryptography. PKC 1998. Lecture Notes in Computer Science, vol 1431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054014
Download citation
DOI: https://doi.org/10.1007/BFb0054014
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64693-8
Online ISBN: 978-3-540-69105-1
eBook Packages: Springer Book Archive