메뉴 건너뛰기




Volumn 4521 LNCS, Issue , 2007, Pages 373-384

An identity-based signcryption scheme for multi-domain ad hoc networks

Author keywords

Ad hoc networks; Bilinear pairings; Identity based signcryption; Provable security

Indexed keywords

AD HOC NETWORKS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; NETWORK SECURITY; RANDOM PROCESSES; SEMANTIC WEB;

EID: 38049045124     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72738-5_24     Document Type: Conference Paper
Times cited : (34)

References (29)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Advances in Cryptology-EUROCRYPT 2002, Springer-Verlag
    • J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp. 83-107, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 84958982846 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • Public Key Cryptography-PKC 2002, Springer-Verlag
    • J. Baek, R. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption. In Public Key Cryptography-PKC 2002, LNCS 2274, pp. 80-98, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2274 , pp. 80-98
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 3
    • 84958948780 scopus 로고    scopus 로고
    • A signcryption scheme with signature directly verifiable by public key
    • Public Key Cryptography-PKC'98, Springer-Verlag
    • F. Bao and R.H. Deng. A signcryption scheme with signature directly verifiable by public key. In Public Key Cryptography-PKC'98, LNCS 1431, pp. 55-59, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1431 , pp. 55-59
    • Bao, F.1    Deng, R.H.2
  • 4
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    • Advances in Cryptology-ASIACRYPT 2005, Springer-Verlag
    • P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.J. Quisquater. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, pp. 515-532, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3788 , pp. 515-532
    • Barreto, P.S.L.M.1    Libert, B.2    McCullagh, N.3    Quisquater, J.J.4
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology-CRYPTO 2001, Springer-Verlag
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 7
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
    • Advances in Cryptology-CRYPTO 2003, Springer-Verlag
    • X. Boyen. Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography. In Advances in Cryptology-CRYPTO 2003, LNCS 2729, pp. 383-399, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 8
    • 84942246351 scopus 로고    scopus 로고
    • Identity based authenticated key agreement protocols from pairings
    • Pacific Grove, USA
    • L. Chen and C. Kudla. Identity based authenticated key agreement protocols from pairings. In 16th IEEE Computer Security Foundations Workshop-CSFW'03, pp. 219-233, Pacific Grove, USA, 2003.
    • (2003) 16th IEEE Computer Security Foundations Workshop-CSFW'03 , pp. 219-233
    • Chen, L.1    Kudla, C.2
  • 9
    • 24144498013 scopus 로고    scopus 로고
    • Improved identity-based signcryption
    • Public Key Cryptography-PKC 2005, Springer-Verlag
    • L. Chen and J. Malone-Lee. Improved identity-based signcryption. In Public Key Cryptography-PKC 2005, LNCS 3386, pp. 362-379, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3386 , pp. 362-379
    • Chen, L.1    Malone-Lee, J.2
  • 10
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    • Information Security and Cryptology-ICISC 2003, Springer-Verlag
    • S.S.M. Chow, S.M. Yiu, L.C.K. Hui, and K.P. Chow. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In Information Security and Cryptology-ICISC 2003, LNCS 2971, pp. 352-369, Springer-Verlag, 2004.
    • (2004) LNCS , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 11
    • 7744232568 scopus 로고    scopus 로고
    • TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
    • H. Deng and D.P. Agrawal. TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks, Vol. 2, No. 3, pp. 291-307, 2004.
    • (2004) Ad Hoc Networks , vol.2 , Issue.3 , pp. 291-307
    • Deng, H.1    Agrawal, D.P.2
  • 12
    • 35048817852 scopus 로고    scopus 로고
    • Encrypted message authentication by firewalls
    • Public Key Cryptography-PKC'99, Springer-Verlag
    • C. Gamage, J. Leiwo, and Y. Zheng. Encrypted message authentication by firewalls. In Public Key Cryptography-PKC'99, LNCS 1560, pp. 69-81, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1560 , pp. 69-81
    • Gamage, C.1    Leiwo, J.2    Zheng, Y.3
  • 13
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Selected Areas in Cryptography-SAC 2002, Springer-Verlag
    • F. Hess. Efficient identity based signature schemes based on pairings. In Selected Areas in Cryptography-SAC 2002, LNCS 2595, pp. 310-324, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 16
    • 33646720921 scopus 로고    scopus 로고
    • Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment
    • Information and Communications Security-ICICS 2005, Springer-Verlag
    • S. Kim, H. Lee, and H. Oh. Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In Information and Communications Security-ICICS 2005, LNCS 3783, pp. 323-335, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3783 , pp. 323-335
    • Kim, S.1    Lee, H.2    Oh, H.3
  • 17
    • 24944514037 scopus 로고    scopus 로고
    • Identity-based key agreement protocols in a multiple PKG environment
    • Computational Science and Its Applications-ICCSA 2005, Springer-Verlag
    • H. Lee, D. Kim, S. Kim, and H. Oh. Identity-based key agreement protocols in a multiple PKG environment. In Computational Science and Its Applications-ICCSA 2005, LNCS 3483, pp. 877-886, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3483 , pp. 877-886
    • Lee, H.1    Kim, D.2    Kim, S.3    Oh, H.4
  • 18
    • 26844533458 scopus 로고    scopus 로고
    • A new scheme for key management in ad hoc networks
    • 4th International Conference on Networking-ICN 2005, Springer-Verlag
    • G. Li and W. Han. A new scheme for key management in ad hoc networks. In 4th International Conference on Networking-ICN 2005, LNCS 3421, pp. 242-249, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3421 , pp. 242-249
    • Li, G.1    Han, W.2
  • 19
    • 84939205648 scopus 로고    scopus 로고
    • A new identity based signcryption schemes from pairings
    • Paris, France
    • B. Libert and J.J. Quisquater. A new identity based signcryption schemes from pairings. In 2003 IEEE information theory workshop, pp. 155-158, Paris, France, 2003.
    • (2003) 2003 IEEE information theory workshop , pp. 155-158
    • Libert, B.1    Quisquater, J.J.2
  • 20
    • 38049032761 scopus 로고    scopus 로고
    • J. Malone-Lee. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. Available from: http://eprint.iacr.org/2002/ 098.
    • J. Malone-Lee. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. Available from: http://eprint.iacr.org/2002/ 098.
  • 21
    • 34347373013 scopus 로고    scopus 로고
    • Two birds one stone: Signcryption using RSA
    • Topics in Cryptology-CT-RSA 2003, Springer-Verlag
    • J. Malone-Lee and W. Mao. Two birds one stone: signcryption using RSA. In Topics in Cryptology-CT-RSA 2003, LNCS 2612, pp. 211-226, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2612 , pp. 211-226
    • Malone-Lee, J.1    Mao, W.2
  • 22
    • 84947723598 scopus 로고
    • Distributed signcryption
    • Progress in Cryptology-INDOCRYPT 2000, Springer-Verlag
    • Y. Mu and V. Varadharajan. Distributed signcryption. In Progress in Cryptology-INDOCRYPT 2000, LNCS 1977, pp. 155-164, Springer-Verlag, 2000.
    • (1977) LNCS , pp. 155-164
    • Mu, Y.1    Varadharajan, V.2
  • 23
    • 13944275248 scopus 로고    scopus 로고
    • ISSRP: A secure routing protocol using identity-based signcryption scheme in ad-hoc networks
    • Parallel and Distributed Computing: Applications and Technologies-PDCAT 2004, Springer-Verlag
    • B.N. Park, J. Myung, and W. Lee. ISSRP: a secure routing protocol using identity-based signcryption scheme in ad-hoc networks. In Parallel and Distributed Computing: Applications and Technologies-PDCAT 2004, LNCS 3320, pp. 711-714, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3320 , pp. 711-714
    • Park, B.N.1    Myung, J.2    Lee, W.3
  • 24
    • 25844478002 scopus 로고    scopus 로고
    • ISMANET: A secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks
    • B.N. Park and W. Lee. ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks. IEICE Transactions on Communications, Vol. E88-B, No. 6, pp. 2548-2556, 2005.
    • (2005) IEICE Transactions on Communications , vol.E88-B , Issue.6 , pp. 2548-2556
    • Park, B.N.1    Lee, W.2
  • 25
    • 84865636074 scopus 로고
    • Electronic funds transfer protocol using domain-verifiable signcryption scheme
    • Information Security and Cryptology-ICISC'99, Springer-Verlag
    • M. Seo and K. Kim. Electronic funds transfer protocol using domain-verifiable signcryption scheme. In Information Security and Cryptology-ICISC'99, LNCS 1787, pp. 269-277, Springer-Verlag, 1999.
    • (1787) LNCS , pp. 269-277
    • Seo, M.1    Kim, K.2
  • 26
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology-CRYPTO'84, Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-CRYPTO'84, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 27
    • 84949961454 scopus 로고    scopus 로고
    • New signcryption schemes based on KCDSA
    • Information Security and Cryptology-ICISC 2001, Springer-Verlag
    • D.H. Yum and P.J. Lee. New signcryption schemes based on KCDSA. In Information Security and Cryptology-ICISC 2001, LNCS 2288, pp. 305-317, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2288 , pp. 305-317
    • Yum, D.H.1    Lee, P.J.2
  • 28
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption)
    • Advances in Cryptology-CRYPTO'97, Springer-Verlag
    • Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) « cost (signature) + cost (encryption). In Advances in Cryptology-CRYPTO'97, LNCS 1294, pp. 165-179, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 29
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption schemes on elliptic curves
    • Y. Zheng and H. Imai. How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters, Vol. 68, No.5, pp. 227-233, 1998.
    • (1998) Information Processing Letters , vol.68 , Issue.5 , pp. 227-233
    • Zheng, Y.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.