메뉴 건너뛰기




Volumn 37, Issue 1, 2005, Pages 81-109

Signcryption with non-interactive non-repudiation

Author keywords

Non repudiation; Provable security; Signcryption

Indexed keywords

COMPOSITION; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 23944489541     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-004-3806-6     Document Type: Article
Times cited : (13)

References (33)
  • 4
  • 16
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Springer-Verlag
    • R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, Springer-Verlag (1998) pp. 13-25.
    • (1998) Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 17
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. In SIAM J. Comput.,Vol. 33, Issue 1 (2003) pp. 167-226.
    • (2003) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 19
    • 0037105918 scopus 로고    scopus 로고
    • Public key signatures in the multi-user setting
    • S. Galbraith, J. Malone-Lee and N. P. Smart, Public key signatures in the multi-user setting. Inform. Process. Lett. Vol. 83, Issue 5 (2002) pp. 263-266.
    • (2002) Inform. Process. Lett. , vol.83 , Issue.5 , pp. 263-266
    • Galbraith, S.1    Malone-Lee, J.2    Smart, N.P.3
  • 21
    • 0023985465 scopus 로고    scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., Vol. 17, Issue 2 (1998) pp. 281-308.
    • (1998) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 22
    • 0032655531 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of Petersen-Michels signcryption scheme
    • W. H. He and T. C. Wu, Cryptanalysis and improvement of Petersen-Michels signcryption scheme. IEE Proc. - Computers Digital Techniques, Vol. 146, Issue 2 (1999) pp. 123-124.
    • (1999) IEE Proc. - Computers Digital Techniques , vol.146 , Issue.2 , pp. 123-124
    • He, W.H.1    Wu, T.C.2
  • 25
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. J. Menezes, T. Okamato and S. A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory, Vol. 39, Issue 5 (1993) pp. 1639-1646.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.J.1    Okamato, T.2    Vanstone, S.A.3
  • 27
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K. G. Patterson, ID-based signatures from pairings on elliptic curves. Electron Lett. Vol. 38, Issue 18 (2002) pp. 1025-1026.
    • (2002) Electron Lett. , vol.38 , Issue.18 , pp. 1025-1026
    • Patterson, K.G.1
  • 28
    • 0032027223 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of signcryption schemes
    • H. Petersen and M. Michels, Cryptanalysis and improvement of signcryption schemes. IEE Proc. -Computers Digital Techniques, Vol. 145, Issue 2 (1998) pp. 149-151.
    • (1998) IEE Proc. -computers Digital Techniques , vol.145 , Issue.2 , pp. 149-151
    • Petersen, H.1    Michels, M.2
  • 30
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. P. Schnorr, Efficient signature generation by smart cards, J. Cryptol, Vol. 4, Issue 3 (1991) pp. 161-174.
    • (1991) J. Cryptol , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 31
    • 0037142442 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the Weil pairing
    • N. P. Smart, An identity based authenticated key agreement protocol based on the Weil pairing. Electronic Lett., Vol. 38, Issue 13 (2002) pp. 630-632.
    • (2002) Electronic Lett. , vol.38 , Issue.13 , pp. 630-632
    • Smart, N.P.1
  • 32
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Springer-Verlag
    • E. R. Verheul, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. In Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, Springer-Verlag (2001) pp. 195-210.
    • (2001) Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science , vol.2045 , pp. 195-210
    • Verheul, E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.