메뉴 건너뛰기




Volumn , Issue , 2010, Pages 622-625

Cryptanalysis of efficient identity based signature/signcryption schemes in the standard model

Author keywords

Attack; Identity based signature signcryption; Standard model

Indexed keywords

ATTACK; HIGH EFFICIENCY; IDENTITY-BASED; STANDARD MODEL; THE STANDARD MODEL;

EID: 78651071053     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPTC.2010.111     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 3
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity based encryption without random oracles
    • EUROCRYPT 2004
    • D. Boneh and X. Boyen. Efficient selective-id secure identity based encryption without random oracles. In EUROCRYPT 2004, volume 3027 of LNCS, pages 223-238, 2004.
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 4
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • CRYPTO 2004
    • D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In CRYPTO 2004, volume 3152 of LNCS, pages 443-459, 2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • CRYPTO 2001
    • D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. In CRYPTO 2001, volume 2139 of LNCS, pages 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 24144498013 scopus 로고    scopus 로고
    • Improved identity- Based signcryption
    • PKC 2005
    • L. Chen and J. Malone-Lee. Improved identity- based signcryption. In PKC 2005, volume 3386 of LNCS, pages 362-379, 2005.
    • (2005) LNCS , vol.3386 , pp. 362-379
    • Chen, L.1    Malone-Lee, J.2
  • 7
    • 35048843296 scopus 로고    scopus 로고
    • Secure hierarchical identity based signature and its application
    • S. Chow, L. Hui, S. Yiu, et al. Secure hierarchical identity based signature and its application. In ICICS 2004, pages 480-494, 2004.
    • ICICS 2004 , vol.2004 , pp. 480-494
    • Chow, S.1    Hui, L.2    Yiu, S.3
  • 8
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • EUROCRYPT 2006
    • C. Gentry. Practical identity-based encryption without random oracles. In EUROCRYPT 2006, volume 4004 of LNCS, pages 445-464.
    • LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 9
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical id-based cryptography
    • ASIACRYPT 2002
    • C. Gentry and A. Silverberg. Hierarchical id-based cryptography. In ASIACRYPT 2002, volume 2501 of LNCS, pages 548-566.
    • LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 10
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • ACM Press
    • F. Hess Efficient identity based signature schemes based on pairings In SAC 2002, ACM Press, 310-324, 2002.
    • (2002) SAC 2002 , pp. 310-324
    • Hess, F.1
  • 11
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • EUROCRYPT 2002
    • J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In EUROCRYPT 2002, volume 2332 of LNCS, pages 466-481, 2002.
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 13
    • 0037194815 scopus 로고    scopus 로고
    • Id-Based Signatures from Pairings on Elliptic Curves
    • duction. 1026
    • K. Paterson Id-Based Signatures from Pairings on Elliptic Curves. IEEE Communications Letters, 2002, 38(18): 1025- duction. 1026.
    • (2002) IEEE Communications Letters , vol.38 , Issue.18 , pp. 1025
    • Paterson, K.1
  • 14
    • 33746372179 scopus 로고    scopus 로고
    • Efficient identity-based signatures secure in the standard model
    • ACISP 2006
    • K. Paterson and J. Schuldt. Efficient identity-based signatures secure in the standard model. In ACISP 2006, volume 4058 of LNCS, pages 207-222, 2006.
    • (2006) LNCS , vol.4058 , pp. 207-222
    • Paterson, K.1    Schuldt, J.2
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature Schemes
    • CRYPTO 1984
    • A. Shamir. Identity-based cryptosystems and signature Schemes. In CRYPTO 1984, volume 196 of LNCS, pages 47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 17
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • EUROCRYPT 2005
    • B. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, volume 3494 of LNCS, pages 114-127, 2005.
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 19
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost(signature and encryption) ≪ cost (signature) + cost (encryption)
    • Crypto 1997
    • Y. Zheng. Digital signcryption or how to achieve cost(signature and encryption) ≪ cost (signature) + cost (encryption). In Crypto 1997, volume 1294 of LNCS, 1997.
    • LNCS , vol.1294 , pp. 1997
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.