메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 383-399

Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 35248874429     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_23     Document Type: Article
Times cited : (380)

References (27)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Proc: Eurocrypt '02
    • J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Proc: Eurocrypt '02, LNCS 2332, 2002.
    • (2002) LNCS 2332
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Proc. Crypto '02
    • P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Proc. Crypto '02, LNCS 2442, 2002.
    • (2002) LNCS 2442
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Proc. Crypto '01, See [6] for the full version
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proc. Crypto '01, LNCS 2139, pages 213-229, 2001. See [6] for the full version.
    • (2001) LNCS 2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Proc. Asiacrypt '01
    • D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Proc. Asiacrypt '01, LNCS 2248, pages 514-532, 2001.
    • (2001) LNCS 2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 10
    • 1142294442 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In Proc. 8th IMA Int. Conf. Cryptography and Coding, pages 26-28, 2001.
    • (2001) Proc. 8th IMA Int. Conf. Cryptography and Coding , pp. 26-28
    • Cocks, C.1
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adap-tive chosen-message attacks
    • U. Feige, A. Fiat, and A. Shamir. A digital signature scheme secure against adap-tive chosen-message attacks. SIAM J. Computing, 17(2):281-308, 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 12
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. J. Cryptology, 1:77-94, 1988.
    • (1988) J. Cryptology , vol.1 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 13
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Proc. Crypto '86
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. Crypto '86, LNCS 263, pages 186-194, 1984.
    • (1984) LNCS 263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 16
    • 0037974305 scopus 로고    scopus 로고
    • Exponent group signature schemes and efficient identity based signature schemes based on pairings
    • F. Hess. Exponent group signature schemes and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002/012, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology ePrint Archive, Report 2002/012
    • Hess, F.1
  • 17
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Proc. Eurocrypt '02
    • J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In Proc. Eurocrypt '02, LNCS 2332, pages 466-481, 2002.
    • (2002) LNCS 2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 18
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Proc. 4th Alg. Numb. Th. Symp.
    • A. Joux. A one round protocol for tripartite Diffie-Hellman. In Proc. 4th Alg. Numb. Th. Symp., LNCS 1838, pages 385-294, 2000.
    • (2000) LNCS 1838 , pp. 385-1294
    • Joux, A.1
  • 23
    • 2642549675 scopus 로고    scopus 로고
    • Cryptosystems based on pairings
    • Okinawa, Japan
    • R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairings. In Proc. SCIS '00, pages 26-28, Okinawa, Japan, 2000.
    • (2000) Proc. SCIS '00 , pp. 26-28
    • Sakai, R.1    Ohgishi, K.2    Kasahara, M.3
  • 24
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Proc. Crypto '84
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. Crypto '84, LNCS 196, pages 47-53, 1984.
    • (1984) LNCS 196 , pp. 47-53
    • Shamir, A.1
  • 25
    • 34047167609 scopus 로고    scopus 로고
    • An identity based authenticated key agreement protocol based on the Weil pairing
    • N.P. Smart. An identity based authenticated key agreement protocol based on the Weil pairing. Cryptology ePrint Archive, Report 2001/111, 2001. http://eprint.iacr.org/.
    • (2001) Cryptology ePrint Archive, Report 2001/111
    • Smart, N.P.1
  • 26
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval J. Stern. Security arguments for digital signatures and blind signatures. J. Cryptology, 13:361-396, 2000.
    • (2000) J. Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 27
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signatured & encryption) ≪ cost (signature) + cost (encryption)
    • Proc. Crypto '97
    • Y. Zheng. Digital signcryption or how to achieve cost (signatured & encryption) ≪ cost (signature) + cost (encryption). In Proc. Crypto '97, LNCS 1294, 1997.
    • (1997) LNCS 1294
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.