메뉴 건너뛰기




Volumn 6, Issue 6, 2010, Pages 1923-1931

Cryptanalysis of an identity based signcryption scheme without random oracles

Author keywords

Identity based; Semantic security; Signcryption; Strongly existentially unforgeability

Indexed keywords

COMMUNICATION OVERHEADS; COMPUTATIONAL COSTS; CRYPTOGRAPHIC PRIMITIVES; IDENTITY AUTHENTICATION; IDENTITY-BASED; IDENTITY-BASED SIGNCRYPTION; IDENTITY-BASED SIGNCRYPTION SCHEME; SECURITY MODEL; SECURITY WEAKNESS; SEMANTIC SECURITY; SIGNCRYPTION; STANDARD MODEL; UNFORGEABILITY; WITHOUT RANDOM ORACLES;

EID: 77956956687     PISSN: 15539105     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (15)
  • 1
    • 54349101206 scopus 로고    scopus 로고
    • Identity based signcryption scheme without random oracles
    • Y.Yu, B.Yang, Y. Sun, S.Zhou, Identity based signcryption scheme without random oracles [J]. Computer Standards & Interfaces. 2009, 31:56-62
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 56-62
    • Yu, Y.1    Yang, B.2    Sun, Y.3    Zhou, S.4
  • 2
    • 0001827537 scopus 로고
    • Identity-based cryptosystem and signature scheme
    • Lecture Notes in Computer Science
    • A. Shamir, Identity-based cryptosystem and signature scheme [C]. In Proceedings of Cryptography-CRYPTO 1984, 1985, Lecture Notes in Computer Science 196:120-126
    • (1985) Proceedings of Cryptography-CRYPTO 1984 , vol.196 , pp. 120-126
    • Shamir, A.1
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairings
    • Lecture Notes in Computer Science
    • D. Boneh, M. Franklin, Identity-based encryption from the Weil pairings [C]. In Proceedings of Cryptology-CRYPTO 2001, 2001, Lecture Notes in Computer Science 2139:213-229
    • (2001) Proceedings of Cryptology-CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Lecture Notes in Computer Science
    • F. Hess, Efficient identity based signature schemes based on pairings [C]. In Proceedings of SAC 2002, 2002, Lecture Notes in Computer Science 2595:310-324
    • (2002) Proceedings of SAC 2002 , vol.2595 , pp. 310-324
    • Hess, F.1
  • 5
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Lecture Notes in Computer Science
    • J.C. Cha, J.H. Cheon, An identity-based signature from gap Diffie-Hellman groups [C]. In Proceedings of PKC 2003, 2003, Lecture Notes in Computer Science 2567:18-30
    • (2003) Proceedings of PKC 2003 , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 6
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity based encryption without random oracles
    • Lecture Notes in Computer Science
    • R. Waters, Efficient identity based encryption without random oracles [C]. In Proceedings of Eurocrypt 2005, 2005, Lecture Notes in Computer Science 3494:114-127
    • (2005) Proceedings of Eurocrypt 2005 , vol.3494 , pp. 114-127
    • Waters, R.1
  • 7
    • 33746372179 scopus 로고    scopus 로고
    • Efficient identity based signatures secure in the standard model
    • Lecture Notes in Computer Science
    • K.G. Paterson, J.C.N. Schuldt, Efficient identity based signatures secure in the standard model [C]. In Proceedings of Information Security and Privacy-ACISP 2006, 2006, Lecture Notes in Computer Science 4058: 207-222
    • (2006) Proceedings of Information Security and Privacy-ACISP 2006 , vol.4058 , pp. 207-222
    • Paterson, K.G.1    Schuldt, J.C.N.2
  • 8
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption)
    • Lecture Notes in Computer Science
    • Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption) [C]. In Proceedings of Cryptography-CRYPTO 1997, 1997, Lecture Notes in Computer Science 1294:165-179.
    • (1997) Proceedings of Cryptography-CRYPTO 1997 , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 10
    • 84939205648 scopus 로고    scopus 로고
    • A new identity based signcryption scheme from pairings
    • B. Libert, J.J. Quisquator, A new identity based signcryption scheme from pairings [C]. In Proceedings of IW 2003, pp:155-158
    • (2003) Proceedings of IW , pp. 155-158
    • Libert, B.1    Quisquator, J.J.2
  • 11
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    • Lecture Notes in Computer Science
    • S.S.M. Chow, S.M. Yiu, L.C.K. Hui, K.P. Chow, Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [C]. In Proceedings of Information Security and Cryptology-ICISC 2003, 2004, Lecture Notes in Computer Science 2971: 352-369
    • (2004) Proceedings of Information Security and Cryptology-ICISC 2003 , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 12
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity based signcryption: a Swiss army knife for identity based cryptography
    • Lecture Notes in Computer Science
    • X. Boyen, Multipurpose identity based signcryption: a Swiss army knife for identity based cryptography [C]. In Proceedings of Cryptology-CRYPTO 2003, 2003, Lecture Notes in Computer Science 2792:383-399
    • (2003) Proceedings of Cryptology-CRYPTO 2003 , vol.2792 , pp. 383-399
    • Boyen, X.1
  • 13
    • 24144498013 scopus 로고    scopus 로고
    • Improved identity-based signcryption
    • Lecture Notes in Computer Science
    • L. Chen, J. Malone-Lee, Improved identity-based signcryption [C]. In Proceedings of PKC 2005, 2005, Lecture Notes in Computer Science 3386:362-379
    • (2005) Proceedings of PKC 2005 , vol.3386 , pp. 362-379
    • Chen, L.1    Malone-Lee, J.2
  • 14
    • 33646820668 scopus 로고    scopus 로고
    • Efficient and provably-secure identity based signatures and signcryption from bilinear maps
    • Lecture Notes in Computer Science
    • P.S.L.M. Barreto, B. Libert, N. McCullagh, J.J. Quisquater, Efficient and provably-secure identity based signatures and signcryption from bilinear maps [C]. In Proceedings of Cryptology-ASIACRYPT 2005, 2005, Lecture Notes in Computer Science 3788:515-532
    • (2005) Proceedings of Cryptology-ASIACRYPT 2005 , vol.3788 , pp. 515-532
    • Barreto, P.S.L.M.1    Libert, B.2    McCullagh, N.3    Quisquater, J.J.4
  • 15
    • 33745855807 scopus 로고    scopus 로고
    • Strongly unforgeable signatures based on computational Diffie-Hellman
    • Lecture Notes in Computer Science
    • D.Boneh, E. Shen, and B.Waters, Strongly unforgeable signatures based on computational Diffie-Hellman [C]. In Proceedings of PKC 2005, 2005, Lecture Notes in Computer Science 3958:229-240
    • (2005) Proceedings of PKC 2005 , vol.3958 , pp. 229-240
    • Boneh, D.1    Shen, E.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.