메뉴 건너뛰기




Volumn 5379 LNCS, Issue , 2009, Pages 115-129

Cryptanalysis of Mu et al.'s and Li et al.'s schemes and a provably secure ID-based broadcast signcryption (IBBSC) scheme

Author keywords

Bilinear Pairing; Broadcast Encryption; Cryptanalysis; ID based Cryptosystem; Provable Security; Random Oracle; Signcryption

Indexed keywords

BILINEAR PAIRING; BROADCAST ENCRYPTION; CRYPTANALYSIS; ID-BASED CRYPTOSYSTEM; PROVABLE SECURITY; RANDOM ORACLE; SIGNCRYPTION;

EID: 70350680966     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00306-6_9     Document Type: Conference Paper
Times cited : (12)

References (7)
  • 4
    • 35448936926 scopus 로고    scopus 로고
    • Indentity-based broadcast signcryption
    • Li, F., Xin, X., Hu, Y.: Indentity-based broadcast signcryption. Computer Standards and Interfaces 30(1-2), 89-94 (2008)
    • (2008) Computer Standards and Interfaces , vol.30 , Issue.1-2 , pp. 89-94
    • Li, F.1    Xin, X.2    Hu, Y.3
  • 5
    • 35048884128 scopus 로고    scopus 로고
    • Mu, Y., Susilo, W., Lin, Y.-X., Ruan, C.: Identity-based authenticated broadcast encryption and distributed authenticated encryption. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, 3321, pp. 169-181. Springer, Heidelberg (2004)
    • Mu, Y., Susilo, W., Lin, Y.-X., Ruan, C.: Identity-based authenticated broadcast encryption and distributed authenticated encryption. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 169-181. Springer, Heidelberg (2004)
  • 6
    • 67650046720 scopus 로고    scopus 로고
    • Sharmila Deva Selvi, S., Sree Vivek, S., Naresh Karuturi, N., Gopalakrishnan, R., Pandu Rangan, C.: Cryptanalysis of bohio et al.'s id-based broadcast signcryption scheme for wireless ad-hoc networks. In: Proceedings of Sixth Annual Conference on Privacy, Security and Trust, PST 2008 (2008)
    • Sharmila Deva Selvi, S., Sree Vivek, S., Naresh Karuturi, N., Gopalakrishnan, R., Pandu Rangan, C.: Cryptanalysis of bohio et al.'s id-based broadcast signcryption scheme for wireless ad-hoc networks. In: Proceedings of Sixth Annual Conference on Privacy, Security and Trust, PST 2008 (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.