메뉴 건너뛰기




Volumn 85, Issue , 2004, Pages 216-217

Signcryption based on elliptic curve and its multi-party schemes

Author keywords

Distributed key generation; Elliptic curve; Signcryption; Threshold cryptosystem

Indexed keywords

BROADCAST SCHEME; CHOSEN CIPHERTEXT ATTACK; COMMUNICATION COST; COMPUTATION COSTS; CRYPTOSYSTEMS; DISTRIBUTED GENERATION; DISTRIBUTED KEY GENERATION; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOSYSTEM; ELLIPTIC CURVE CRYPTOSYSTEMS; PUBLICLY VERIFIABLE; SIGNCRYPTION; SIGNCRYPTION SCHEMES; SYMMETRIC CIPHER; THIRD PARTIES; THRESHOLD CRYPTOSYSTEMS; THRESHOLD SCHEMES;

EID: 34548403156     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1046290.1046336     Document Type: Conference Paper
Times cited : (21)

References (9)
  • 1
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature) + cost (encryption)
    • Advances in Cryplology-CRYPTO'97
    • Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature) + cost (encryption). In Advances in Cryplology-CRYPTO'97, LNCS1294. 1997, 165-179
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 2
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption schemes on elliptic curves
    • Y. Zheng, H. Imai. How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters Vol.68. 1998, 227-233
    • (1998) Information Processing Letters , vol.68 , pp. 227-233
    • Zheng, Y.1    Imai, H.2
  • 3
    • 84947929166 scopus 로고    scopus 로고
    • Signcryption and Its Applications in Efficient Public Key Solutions
    • Proceedings of 1997 Information Security Worhthop (ISW'97), Springer-Verlag
    • Y. Zheng. Signcryption and Its Applications in Efficient Public Key Solutions.In Proceedings of 1997 Information Security Worhthop (ISW'97), LNCS1397, Springer-Verlag. 1998,291-312
    • (1998) LNCS , vol.1397 , pp. 291-312
    • Zheng, Y.1
  • 4
    • 84958982846 scopus 로고    scopus 로고
    • Formal Proofs for the Security of Signcryption
    • (PKC'02), Springer-Verlag
    • J.Baek, R.Steinfeld and Y.Zheng. Formal Proofs for the Security of Signcryption. In LNCS2274 (PKC'02), Springer-Verlag. 2002,80-98
    • (2002) LNCS , vol.2274 , pp. 80-98
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 5
    • 84880901653 scopus 로고    scopus 로고
    • The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)
    • Advances In Cryptology-CRYPTO'01, Springer-Verlag
    • H. Krawczyk. The Order Of Encryption And Authentication For Protecting Communications (Or: How Secure Is SSL?). In Advances In Cryptology-CRYPTO'01, LNCS2139, Springer-Verlag. 2001,310-331
    • (2001) LNCS , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 6
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Advances in Cryptology-EUROCRYPT'91, Springer-verlag
    • T.Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology-EUROCRYPT'91, LNCS547. Springer-verlag. 1991, 522-526.
    • (1991) LNCS , vol.547 , pp. 522-526
    • Pedersen, T.1
  • 7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.