메뉴 건너뛰기




Volumn , Issue , 2009, Pages 70-75

MIDSCYK: An efficient provably secure multirecipient identity-based signcryption scheme

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; BANDWIDTH REQUIREMENT; BILINEAR DIFFIE-HELLMAN PROBLEM; CHOSEN CIPHERTEXT ATTACK; CIPHERTEXT; COMPUTATIONAL OVERHEADS; CRYPTOGRAPHIC PRIMITIVES; DIGITAL SIGNATURE; IDENTITY-BASED SIGNCRYPTION SCHEME; NON-REPUDIATION; PERFORMANCE ENHANCEMENTS; PROVABLY SECURE; PUBLIC KEYS; PUBLIC VERIFIABILITY; RANDOM ORACLE MODEL; SIGNCRYPTION;

EID: 67650658861     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNM.2009.4907192     Document Type: Conference Paper
Times cited : (17)

References (17)
  • 1
    • 84947929166 scopus 로고    scopus 로고
    • Signcryption and its Applications in Efficient Public Key Solutions
    • Y. Zheng, "Signcryption and its Applications in Efficient Public Key Solutions", In Proceedings of ISW'97, pp. 291-312,1998.
    • (1998) Proceedings of ISW'97 , pp. 291-312
    • Zheng, Y.1
  • 2
    • 84958982846 scopus 로고    scopus 로고
    • Fonnal Proofs for the Security of Signcryption
    • Proceedings of PKC'02
    • J. Back, R. Steinfeld and Y. Zheng, "Fonnal Proofs for the Security of Signcryption", In Proceedings of PKC'02, 2002, Springer LNCS 2274.
    • (2002) Springer LNCS , vol.2274
    • Back, J.1    Steinfeld, R.2    Zheng, Y.3
  • 3
    • 35248874429 scopus 로고    scopus 로고
    • Multi-purpose Identity-Based Signcryption (A Swiss Anny Knife for Identity-Based Cryptography)
    • X. Boyen, "Multi-purpose Identity-Based Signcryption (A Swiss Anny Knife for Identity-Based Cryptography), In Proceedings of CRYPTO 2003, pp. 383-399, 2003.
    • (2003) Proceedings of CRYPTO , pp. 383-399
    • Boyen, X.1
  • 4
    • 67650654341 scopus 로고    scopus 로고
    • A. Shamir, Identity Based Cryptosystems and Signature Schemes, In Advances in Cryptology- CRYPTO 1984, 1984, Springer-Verlag, LNCS 0196.
    • A. Shamir, "Identity Based Cryptosystems and Signature Schemes", In Advances in Cryptology- CRYPTO 1984, 1984, Springer-Verlag, LNCS 0196.
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity Based Encryption from the Weil Pairing
    • Advances in Cryptology- CRYPTO, Springer
    • D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing.", In Advances in Cryptology- CRYPTO 2001, 2001, Springer, LNCS 2139.
    • (2001) LNCS , vol.2139
    • Boneh, D.1    Franklin, M.2
  • 8
    • 34347373013 scopus 로고    scopus 로고
    • Two Birds One Stone: Signcryption using RSA
    • Proceedings of CT-RSA, Springer-Verlag
    • J. Malone-Lee and W. Mao, "Two Birds One Stone: Signcryption using RSA", In Proceedings of CT-RSA 2003, Springer-Verlag, LNCS series.
    • (2003) LNCS series
    • Malone-Lee, J.1    Mao, W.2
  • 9
    • 84946844750 scopus 로고    scopus 로고
    • A One-Round Protocol for Tripartite Diffie-Hellman Algorithm
    • Number Theory Symposium- ANTS-IV, Springer-Verlag
    • A. Joux, "A One-Round Protocol for Tripartite Diffie-Hellman Algorithm", Number Theory Symposium- ANTS-IV, Springer-Verlag, LNCS 1838, pp. 385-394, 2000.
    • (2000) LNCS , vol.1838 , pp. 385-394
    • Joux, A.1
  • 11
    • 1642407903 scopus 로고    scopus 로고
    • Efficient Identity Based Signature Schemes Based on Pairings
    • Proceedings of SAC, Springer
    • F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings", In Proceedings of SAC 2002, Springer, LNCS series.
    • (2002) LNCS series
    • Hess, F.1
  • 12
    • 24144432124 scopus 로고    scopus 로고
    • A Multi-Receiver Identity-Based Encryption Scheme and Its Application to Broadcast Encryption
    • J. Baek, R. Safavi-Naini, W. Susilo, "A Multi-Receiver Identity-Based Encryption Scheme and Its Application to Broadcast Encryption", In Proceedings of PKC'05, 2005.
    • (2005) Proceedings of PKC'05
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 13
    • 84937428623 scopus 로고    scopus 로고
    • P. Barreto, H. Y. Kim, B. Lynn and M .Scott, Efficient Algorithms for Pairing-based Cryptosystems, In Advances in Cryptology- CRYPTO 2002, Springer-Verlag, LNCS 2442, pp. 354-368, 2002.
    • P. Barreto, H. Y. Kim, B. Lynn and M .Scott, "Efficient Algorithms for Pairing-based Cryptosystems", In Advances in Cryptology- CRYPTO 2002, Springer-Verlag, LNCS 2442, pp. 354-368, 2002.
  • 14
    • 33746324583 scopus 로고    scopus 로고
    • S. Duan and Z. Cao, Efficient and Provably Secure Multi-receiver Identity-Based Signcryption, L. Batten and R. Safavi-Naini (Eds.), ACISP 2006, Springer-Verlag, LNCS 4058, pp. 195-206,2006.
    • S. Duan and Z. Cao, "Efficient and Provably Secure Multi-receiver Identity-Based Signcryption", L. Batten and R. Safavi-Naini (Eds.), ACISP 2006, Springer-Verlag, LNCS 4058, pp. 195-206,2006.
  • 16
    • 84955339164 scopus 로고    scopus 로고
    • Secure Integration of Asymmetric and Symmetric Encryption Schemes, In Advances in Cryptology - CRYPTO'99, Springer-Verlag
    • E. Fujisaki and T. Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes", In Advances in Cryptology - CRYPTO'99, Springer-Verlag, LNCS 1666, pp. 537-554,1999.
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 17
    • 0032661699 scopus 로고    scopus 로고
    • Multi-cast Security: A Taxonomy and Some Efficient Constructions
    • New York, NY, March
    • R. Canetti et aI., "Multi-cast Security: A Taxonomy and Some Efficient Constructions", In Proceedings of lNFOCOM'99, vol. 2, pp. 708-716, New York, NY, March 1999.
    • (1999) Proceedings of lNFOCOM'99 , vol.2 , pp. 708-716
    • Canetti, R.1    aI2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.