Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2009, Vol. 32 ›› Issue (1): 60-64.doi: 10.13190/jbupt.200901.60.zhangmw

• Papers • Previous Articles     Next Articles

Privacy Preserving Self-certified Signcryption Scheme in Trusted Modules

  

  • Received:2008-05-20 Revised:2008-11-05 Online:2009-01-28 Published:2009-01-28

Abstract:

Message trustworthy and behavior trustworthy are crucial between trusted computing modules. To overcome the key escrow problem and the secure channel issue between trusted computing modules that seem to be inherent to ID-based signcryption, an efficient ID-based self-certified signcryption scheme(IDTSC) is proposed, which can resist on dishonest CA’s forging and colluding attacks in TPM channel. Security models, including confidentiality, unforgeability, ciphertext anonymity, and dishonest CA tractability, are discussed. The proposed scheme can be used in secure and anonymous transfer requirements such as privacy preserving and identity hiding.

Key words: