메뉴 건너뛰기




Volumn 4097 LNCS, Issue , 2006, Pages 342-351

An identity-based signcryption scheme with short ciphertext from pairings

Author keywords

Identity based cryptography; Pairings; Signcryption

Indexed keywords

ADAPTIVE ALGORITHMS; ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; COMPUTER SCIENCE; CONSTRAINT THEORY; DIGITAL SIGNAL PROCESSING; SECURITY OF DATA; CRYPTOGRAPHY; EMBEDDED SYSTEMS; INTELLIGENT BUILDINGS; MULTIMEDIA SERVICES; NETWORK SECURITY; RADIO FREQUENCY IDENTIFICATION (RFID); SENSOR NETWORKS; SOFTWARE RELIABILITY;

EID: 33749410609     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11807964_35     Document Type: Conference Paper
Times cited : (6)

References (17)
  • 1
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+ cost (encryption)
    • Advances in Cryptology - Crypto'97, Springer
    • Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature)+ Cost (Encryption), Advances in Cryptology - Crypto'97, LNCS 1294, Springer, pp.165-179, 1997.
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 2
    • 84937414347 scopus 로고    scopus 로고
    • Identification, signature and signcryption using high order residues modulo an RSA composite
    • Proc. of PKC'01, Springer
    • Y. Zheng, Identification, Signature and Signcryption using High Order Residues Modulo an RSA Composite, Proc. of PKC'01, LNCS 1992, Springer, pp. 48-63, 2001.
    • (2001) LNCS , vol.1992 , pp. 48-63
    • Zheng, Y.1
  • 3
    • 84947929166 scopus 로고    scopus 로고
    • Signcryption and its applications in efficient public key solutions
    • Y. Zheng, Signcryption and its applications in efficient public key solutions, Proc. of ISW'97,pp. 291-312, 1998.
    • (1998) Proc. of ISW'97 , pp. 291-312
    • Zheng, Y.1
  • 4
    • 33644646469 scopus 로고    scopus 로고
    • Efficient signcryption schemes on elliptic curves
    • Chapman & Hall
    • Y.Zheng, H. Imai, Efficient Signcryption Schemes On Elliptic Curves, Proc. of IFIP/SEC'98, Chapman & Hall, 1998.
    • (1998) Proc. of IFIP/SEC'98
    • Zheng, Y.1    Imai, H.2
  • 5
    • 84944242785 scopus 로고    scopus 로고
    • A signcryption scheme based on integer factorization
    • R. Steinfeld, Y. Zheng, A Signcryption Scheme Based on Integer Factorization, Proc. of ISW'00,pp. 308-322, 2000.
    • (2000) Proc. of ISW'00 , pp. 308-322
    • Steinfeld, R.1    Zheng, Y.2
  • 6
    • 84949961454 scopus 로고    scopus 로고
    • New signcryption schemes based on KCDSA
    • Proc. of ICISC'01, Springer
    • B.H. Yum, P.J. Lee, New Signcryption Schemes Based on KCDSA, Proc. of ICISC'01, LNCS2288, Springer, pp. 305-317, 2001.
    • (2001) LNCS , vol.2288 , pp. 305-317
    • Yum, B.H.1    Lee, P.J.2
  • 7
    • 23944499476 scopus 로고    scopus 로고
    • New identity based Signcryption schemes based on pairings
    • Paris, France
    • B. Libert and J.-J. Quisquater. New identity based Signcryption schemes based on pairings. In IEEE Information Theory Workshop, Paris, France, 2003.
    • (2003) IEEE Information Theory Workshop
    • Libert, B.1    Quisquater, J.-J.2
  • 9
    • 33645596850 scopus 로고    scopus 로고
    • Signcryption scheme for identity-based cryptosystems
    • D. Nalla and K. C. Reddy. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report 2003/066, 2002. http://eprint.iacr.org/ 2003/066.
    • (2002) Cryptology ePrint Archive, Report , vol.2003 , Issue.66
    • Nalla, D.1    Reddy, K.C.2
  • 11
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based Signcryption: A swiss army knife for identity-based cryptography
    • Advances in Cryptology - Crypto'2003, Springer-Verlag
    • X. Boyen. Multipurpose identity-based Signcryption: A swiss army knife for identity-based cryptography. In Advances in Cryptology - Crypto'2003, volume 2729 of Lecture Notes in Computer Science, pages 383-399. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 12
    • 33645598495 scopus 로고    scopus 로고
    • Improved identity-based signcryption
    • L. Chen and J.Malone-Lee. Improved identity-based Signcryption. Cryptology ePrint Archive, Report 2004/114, 2004. http://eprint.iacr.org/2003/ 114.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.114
    • Chen, L.1    Malone-Lee, J.2
  • 14
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    • Information Security and Cryptology - ICISC 2003, Springer-Verlag
    • Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, and K.P. Chow. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Information Security and Cryptology - ICISC 2003, LNCS 2971, pp. 352-369. Springer-Verlag, 2004
    • (2004) LNCS , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 15
    • 26444568207 scopus 로고    scopus 로고
    • Identity-based partial message recovery signatures (or how to shorten ID-based signatures)
    • Financial Cryptography and Data Security (FC'05), Springer Verlag
    • Farigguo Zhang, Willy Susilo, and Yi Mu. Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures). Financial Cryptography and Data Security (FC'05), Lecture Notes in Computer Science, Springer Verlag, 2005, pp47-59
    • (2005) Lecture Notes in Computer Science , pp. 47-59
    • Zhang, F.1    Susilo, W.2    Mu, Y.3
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology -Crypto' 84, Springer
    • A. Shamir, identity-based Cryptosystems and Signature Schemes, Advances in Cryptology -Crypto' 84, LNCS 0196, Springer, 1984.
    • (1984) LNCS , vol.196
    • Shamir, A.1
  • 17
    • 35048817852 scopus 로고    scopus 로고
    • Encrypted message authentication by Firewalls
    • Proc. of PKC'99, Springer
    • G. Gamage, J. Leiwo, Y. Zheng. Encrypted message authentication by Firewalls, Proc. of PKC'99, LNCS 1560, Springer, pp. 69-81, 1999.
    • (1999) LNCS , vol.1560 , pp. 69-81
    • Gamage, G.1    Leiwo, J.2    Zheng, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.