Relations among privacy notions for signcryption and key invisible "sign-then-encrypt"

Yang Wang, Mark Manulis, Man Ho Allen Au, Willy Susilo

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

8 Citations (Scopus)

Abstract

Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and key invisibility to protect the identities of signcryption users and were able to prove that key invisibility implies ciphertext anonymity by imposing certain conditions on the underlying signcryption scheme. This paper revisits the relationship amongst privacy notions for signcryption. We prove that key invisibility implies ciphertext anonymity without any additional restrictions. More surprisingly, we prove that key invisibility also implies indistinguishability against chosen ciphertext attacks. This places key invisibility on the top of privacy hierarchy for public-key signcryption schemes. On the constructive side, we show that general "sign-then- encrypt" approach offers key invisibility if the underlying encryption scheme satisfies two existing security notions, indistinguishable against adaptive chosen ciphertext attacks and indistinguishability of keys against adaptive chosen ciphertext attacks. By this method we obtain the first key invisible signcryption construction in the standard model.
Original languageEnglish
Title of host publicationInformation Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings
Pages187-202
Number of pages16
DOIs
Publication statusPublished - 26 Sept 2013
Externally publishedYes
Event18th Australasian Conference on Information Security and Privacy, ACISP 2013 - Brisbane, QLD, Australia
Duration: 1 Jul 20133 Jul 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7959 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th Australasian Conference on Information Security and Privacy, ACISP 2013
Country/TerritoryAustralia
CityBrisbane, QLD
Period1/07/133/07/13

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Relations among privacy notions for signcryption and key invisible "sign-then-encrypt"'. Together they form a unique fingerprint.

Cite this