메뉴 건너뛰기




Volumn 2971, Issue , 2004, Pages 352-369

Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

Author keywords

Cryptographic primitives; Elliptic curve cryptosystems; Firewalls; Forward security; Identity based signcryption; Network security; Provable security; Public ciphertext authenticity; Public key cryptosystems; Public verifiability; Semantical security

Indexed keywords

COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 35048854673     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24691-6_26     Document Type: Article
Times cited : (200)

References (22)
  • 2
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman Problem
    • Dieter Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, InnerMongolia 10-13 October, 2003, Proceedings, Springer
    • Feng Bao, Robert H. Deng, and Huafei Zhu. Variations of Diffie-Hellman Problem. In Dieter Qing, Dieter Gollmann, and Jianying Zhou, editors, Information and Communications Security, 5th International Conference, ICICS 2003, InnerMongolia 10-13 October, 2003, Proceedings, volume 2836 of Lecture Notes in Computer Science. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2836
    • Bao, F.1    Deng, R.H.2    Zhu, H.3
  • 3
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-Based Cryptosystems
    • Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002 Proceedings, Springer-Verlag Heidelberg
    • Paulo S.L.M. Barreto, Hae Yong Kim, Ben Lynn, and Michael Scott. Efficient Algorithms for Pairing-Based Cryptosystems. In Moti Yung, editor, Advances in Cryptology: Proceedings of CRYPTO 2002 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002 Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag Heidelberg, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 5
    • 35248891000 scopus 로고    scopus 로고
    • Forward-Security in Private-Key Cryptography
    • Marc Joye, editor, Topics in Cryptology - CT-RSA2003, The Cryptographer's Track at RSA Conference 2003
    • Mihir Bellare and Bennet Yee. Forward-Security in Private-Key Cryptography. In Marc Joye, editor, Topics in Cryptology - CT-RSA2003, The Cryptographer's Track at RSA Conference 2003, volume 2612 of Lecture Notes in Computer Science, pages 1-18, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2612 , pp. 1-18
    • Bellare, M.1    Yee, B.2
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 1923, 2001, Proceedings, Springer-Verlag Heidelberg
    • Dan Boneh and Matt Franklin. Identity-Based Encryption from the Weil Pairing. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 1923, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag Heidelberg, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography
    • Dan Boneh, editor, 23rd International Conference on Advances in Cryptology - CRYPTO 2003, Springer Verlag
    • Xavier Boyen. Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography. In Dan Boneh, editor, 23rd International Conference on Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 382-398. Springer Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 382-398
    • Boyen, X.1
  • 8
    • 35248844436 scopus 로고    scopus 로고
    • An Identity-Based Signature from Gap Diffie-Hellman Groups
    • Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, Sixth International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, Springer
    • Jae Choon Cha and Jung Hee Cheon. An Identity-Based Signature from Gap Diffie-Hellman Groups. In Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, Sixth International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, volume 2567 of Lecture Notes in Computer Science. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2567
    • Cha, J.C.1    Cheon, J.H.2
  • 10
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate Pairing
    • Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings, Springer
    • Steven D. Galbraith, Keith Harrison, and David Soldera. Implementing the Tate Pairing. In Claus Fieker and David R. Kohel, editors, Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings, volume 2369 of Lecture Notes in Computer Science, pages 324-337. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2369 , pp. 324-337
    • Galbraith, S.D.1    Harrison, K.2    Soldera, D.3
  • 11
    • 35048817852 scopus 로고    scopus 로고
    • Encrypted Message Authentication by Firewalls. in Hideki Imai and Yuliang Zheng, editors, Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999 Kamakura, Japan, March 1-3, 1999
    • Springer-Verlag, Heidelberg
    • Chandana Gamage, Jussipekka Leiwo, and Yuliang Zheng. Encrypted Message Authentication by Firewalls. In Hideki Imai and Yuliang Zheng, editors, Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999 Kamakura, Japan, March 1-3, 1999, volume 1560 of Lecture Notes in Computer Science, pages 69-81. Springer-Verlag, Heidelberg, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1560 , pp. 69-81
    • Gamage, C.1    Leiwo, J.2    Zheng, Y.3
  • 12
    • 35248867510 scopus 로고    scopus 로고
    • Efficient Identity Based Signature Schemes based on Pairings
    • K. Nyberg and H. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. Johns, Newfoundland, Canada, August 15-16, 2002. Revised Papers, Springer-Verlag Heidelberg, February
    • Florian Hess. Efficient Identity Based Signature Schemes based on Pairings. In K. Nyberg and H. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. Johns, Newfoundland, Canada, August 15-16, 2002. Revised Papers, volume 2595 of Lecture Notes in Computer Science, pages 310-324. Springer-Verlag Heidelberg, February 2003.
    • (2003) Lecture Notes in Computer Science , vol.2595 , pp. 310-324
    • Hess, F.1
  • 13
    • 35248849357 scopus 로고    scopus 로고
    • Efficient Computations of the Tate Pairing for the Large MOV Degrees
    • Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, Springer-Verlag Heidelberg
    • Tetsuya Izu and Tsuyoshi Takagi. Efficient Computations of the Tate Pairing for the Large MOV Degrees. In Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, volume 2587 of Lecture Notes in Computer Science, pages 283-297. Springer-Verlag Heidelberg, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2587 , pp. 283-297
    • Izu, T.1    Takagi, T.2
  • 14
    • 33645379582 scopus 로고    scopus 로고
    • Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption
    • Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, Springer-Verlag Heidelberg
    • Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, and Jong In Lim. Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. In Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, volume 2587 of Lecture Notes in Computer Science, pages 16-34. Springer-Verlag Heidelberg, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2587 , pp. 16-34
    • Jeong, I.R.1    Jeong, H.Y.2    Rhee, H.S.3    Lee, D.H.4    Lim, J.I.5
  • 15
    • 35048875647 scopus 로고    scopus 로고
    • Implementation of Tate Pairing of Hyperelliptic Curves of Genus 2
    • Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th Annual International Conference on Information Security and Cryptology, Seoul, Korea, Nov 2003, Proceedings, Springer-Verlag, to appear.
    • Eunjeong Lee and YoungJu Choie. Implementation of Tate Pairing of Hyperelliptic Curves of Genus 2. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, 6th Annual International Conference on Information Security and Cryptology, Seoul, Korea, Nov 2003, Proceedings, Lecture Notes in Computer Science, Springer-Verlag, to appear.
    • Lecture Notes in Computer Science
    • Lee, E.1    Choie, Y.2
  • 16
    • 84939205648 scopus 로고    scopus 로고
    • New Identity Based Signcryption Schemes from Pairings
    • Benoît Libert and Jean-Jacques Quisquater. New Identity Based Signcryption Schemes from Pairings. In IEEE Information Theory Workshop, pages 155-158, 2003. Full version available at http://eprint.iacr.org.
    • (2003) IEEE Information Theory Workshop , pp. 155-158
    • Libert, B.1    Quisquater, J.-J.2
  • 20
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • G.R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, Springer-Verlag
    • Adi Shamir. Identity-Based Cryptosystems and Signature Schemes. In G.R. Blakley and David Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO 1984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 21
    • 35248891585 scopus 로고    scopus 로고
    • New DSA-Verifiable Signcryption Schemes
    • Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, Springer-Verlag Heidelberg
    • Jun-Bum Shin, Kwangsu Lee, and Kyungah Shim. New DSA-Verifiable Signcryption Schemes. In Pil Joong Lee and Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers, volume 2587 of Lecture Notes in Computer Science, pages 35-47. Springer-Verlag Heidelberg, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2587 , pp. 35-47
    • Shin, J.-B.1    Lee, K.2    Shim, K.3
  • 22
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪Cost(Signature) + Cost (Encryption)
    • Burton S. Kaliski Jr., editor, Advances in Cryptology: Proceedings of CRYPTO 1997 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Springer-Verlag
    • Yuliang Zheng. Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪Cost(Signature) + Cost (Encryption). In Burton S. Kaliski Jr., editor, Advances in Cryptology: Proceedings of CRYPTO 1997 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.