메뉴 건너뛰기




Volumn 4610 LNCS, Issue , 2007, Pages 13-21

Efficient identity-based signcryption scheme for multiple receivers

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; SEMANTICS; SIGNAL RECEIVERS;

EID: 38049033337     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73547-2_4     Document Type: Conference Paper
Times cited : (64)

References (23)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystem and signature scheme
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 120-126. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 120-126
    • Shamir, A.1
  • 2
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption)
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 4
    • 84958948780 scopus 로고    scopus 로고
    • Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, 1431, pp. 55-59. Springer, Heidelberg (1998)
    • Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55-59. Springer, Heidelberg (1998)
  • 5
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption schemes on elliptic curves
    • Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227-233 (1998)
    • (1998) Information Processing Letters , vol.68 , Issue.5 , pp. 227-233
    • Zheng, Y.1    Imai, H.2
  • 6
    • 34347373013 scopus 로고    scopus 로고
    • Malone-Lee, J., Mao, W.: Two birds one stone: signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 211-226. Springer, Heidelberg (2003)
    • Malone-Lee, J., Mao, W.: Two birds one stone: signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211-226. Springer, Heidelberg (2003)
  • 8
    • 0242445175 scopus 로고    scopus 로고
    • Identity based signcryption. Cryptology ePrint Archive
    • Report 2002/098
    • Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive. Report 2002/098 (2002)
    • (2002)
    • Malone-Lee, J.1
  • 9
    • 84939205648 scopus 로고    scopus 로고
    • A new identity based signcryption scheme from pairings
    • Paris, France, pp
    • Libert, B., Quisquator, J.J.: A new identity based signcryption scheme from pairings. In: 2003 IEEE information theory workshop. Paris, France, pp. 155-158 (2003)
    • (2003) 2003 IEEE information theory workshop , pp. 155-158
    • Libert, B.1    Quisquator, J.J.2
  • 10
    • 35048854673 scopus 로고    scopus 로고
    • Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-L, Lee, D.-H. (eds.) ICISC 2003. LNCS, 2971, pp. 352-369. Springer, Heidelberg (2004)
    • Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-L, Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
  • 11
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity based signcryption: A swiss army knife for identity based cryptography
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Boyen, X.: Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 12
    • 24144498013 scopus 로고    scopus 로고
    • Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 362-379. Springer, Heidelberg (2005)
    • Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362-379. Springer, Heidelberg (2005)
  • 13
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity based signatures and signcryption from bilinear maps
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 515-532
    • Barreto, P.S.L.M.1    Libert, B.2    McCullagh, N.3    Quisquater, J.J.4
  • 14
    • 84947929166 scopus 로고    scopus 로고
    • Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, 1396, pp. 291-312. Springer, Heidelberg (1998)
    • Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 291-312. Springer, Heidelberg (1998)
  • 15
    • 33746324583 scopus 로고    scopus 로고
    • Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 195-206. Springer, Heidelberg (2006)
    • Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195-206. Springer, Heidelberg (2006)
  • 16
    • 24144432124 scopus 로고    scopus 로고
    • Baek, J., Safavi-Naini, R., Susilo, W.: Efficient multi-receiver identity based encryption and its application to broad encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 380-397. Springer, Heidelberg (2005)
    • Baek, J., Safavi-Naini, R., Susilo, W.: Efficient multi-receiver identity based encryption and its application to broad encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380-397. Springer, Heidelberg (2005)
  • 17
    • 24144434019 scopus 로고    scopus 로고
    • Yuen, T.H., Wei, V.K.: Fast and proven secure blind identity based signcryption from pairings. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 305-322. Springer, Heidelberg (2005)
    • Yuen, T.H., Wei, V.K.: Fast and proven secure blind identity based signcryption from pairings. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 305-322. Springer, Heidelberg (2005)
  • 18
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve trace for FR-reduction
    • Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve trace for FR-reduction. IEICE Tranctions on Fundamentals E84-A(5), 1234-1243 (2001)
    • (2001) IEICE Tranctions on Fundamentals , vol.E84-A , Issue.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 19
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairingbased cryptosystems
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairingbased cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 20
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 21
    • 34047151805 scopus 로고    scopus 로고
    • On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive
    • Report 2005/116
    • Smart, N.P., Vercauteren, F.: On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116 (2005) http://eprint.iacr.org/2005/116
    • (2005)
    • Smart, N.P.1    Vercauteren, F.2
  • 22
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 23
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity based encryption without random oracles
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.