메뉴 건너뛰기




Volumn 4, Issue 7, 2010, Pages

Efficient and identity-based signcryption with provably-secure

Author keywords

Forward secure; Identity based; Provably secure; Signcryption

Indexed keywords

DIFFIE-HELLMAN ASSUMPTION; ENCRYPTION SCHEMES; FORWARD-SECURE; IDENTITY-BASED; IDENTITY-BASED SIGNCRYPTION; PROVABLE SECURITY; PROVABLY-SECURE; RANDOM ORACLE MODEL; SIGNATURE SCHEME; SIGNCRYPTION;

EID: 78651574229     PISSN: 19759339     EISSN: None     Source Type: Journal    
DOI: 10.4156/jdcta.vol4.issue7.14     Document Type: Article
Times cited : (6)

References (19)
  • 1
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption << cost (signature) + cost (encryption)
    • Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption << cost (signature) + cost (encryption)", Advances in Cryptology-CRYPTO'97, LNCS 1294, pp.165-179, 1997.
    • (1997) Advances In Cryptology-CRYPTO'97, LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 2
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology-CRYPTO'84, LNCS 196, pp.47-53, 1984.
    • (1984) Advances In Cryptology-CRYPTO'84, LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 5
    • 78651536235 scopus 로고    scopus 로고
    • In 2003 Symposium on Cryptography and Information Security - SCIS'2003, Hamamatsu, Japan
    • R. Sakai and M. Kasahara, "Id-based cryptosystems with pairing on elliptic curve", In 2003 Symposium on Cryptography and Information Security - SCIS'2003, Hamamatsu, Japan, 2003. See also http://eprint.iacr.org/2003/054.
    • (2003) Id-based Cryptosystems With Pairing On Elliptic Curve
    • Sakai, R.1    Kasahara, M.2
  • 6
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
    • X. Boyen, "Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography", Advances in Cryptology-CRYPTO 2003, LNCS 2729, pp.383-399, 2003.
    • (2003) Advances In Cryptology-CRYPTO 2003, LNCS , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 8
    • 35048854673 scopus 로고    scopus 로고
    • Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
    • In Proceeding of Information Security and Cryptology - ICISC 2003
    • Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, et al, "Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity", In Proceeding of Information Security and Cryptology - ICISC 2003, LNCS 2971,pp.352-369,2004.
    • (2004) LNCS , vol.2971 , pp. 352-369
    • Sherman, C.S.M.1    Yiu, S.M.2    Lucas, H.C.K.3
  • 9
    • 33645964923 scopus 로고    scopus 로고
    • Analysis and Improvement of a Signcryption Scheme with Key Privacy
    • In Proceeding of PKC'04
    • Y. Cuomin, S. Wong and X. Deng, "Analysis and Improvement of a Signcryption Scheme with Key Privacy", In Proceeding of PKC'04, LNCS 3650, pp.218-232, 2005.
    • (2005) LNCS , vol.3650 , pp. 218-232
    • Cuomin, Y.1    Wong, S.2    Deng, X.3
  • 10
    • 33749410609 scopus 로고    scopus 로고
    • An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings
    • In Proceeding of EUC Workshops 2006
    • H. Chen, Z. H. Li and Q. Chen, "An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings", In Proceeding of EUC Workshops 2006, LNCS 4097,pp.342-351,2006.
    • (2006) LNCS , vol.4097 , pp. 342-351
    • Chen, H.1    Li, Z.H.2    Chen, Q.3
  • 11
    • 84867515151 scopus 로고    scopus 로고
    • Signcryption in hierarchical identity based cryptosystem
    • In Proceeding of the 20th International Conference on Information Security (SEC'05)
    • S. S.M. Chow, T. H. Yuen, L. C. K. Hui, et al, "Signcryption in hierarchical identity based cryptosystem" In Proceeding of the 20th International Conference on Information Security (SEC'05). IFIP TC11, pp. 443-457, 2005.
    • (2005) IFIP TC11 , pp. 443-457
    • Chow, S.S.M.1    Yuen, T.H.2    Hui, L.C.K.3
  • 13
    • 84937389342 scopus 로고    scopus 로고
    • The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
    • In Proceeding of PKC'01
    • T. Okamoto, D. Pointcheval, "The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes", In Proceeding of PKC'01, LNCS 1992, pp.104-118, 2001.
    • (2001) LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 14
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • In Proceeding of Advances in Cryptology - CRYPTO 2004
    • D. Boneh and X. Boyen, "Secure identity based encryption without random oracles", In Proceeding of Advances in Cryptology - CRYPTO 2004, LNCS 3152, pp.443-459,2004.
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 15
    • 33750052872 scopus 로고    scopus 로고
    • Efficient Signcryption Without Random Oracles
    • In Proceeding of ATC'2006
    • Q. H. Wu, Y. Mu, W. Susilo, et al. "Efficient Signcryption Without Random Oracles", In Proceeding of ATC'2006, LNCS 4158, pp.449-458,2006.
    • (2006) LNCS , vol.4158 , pp. 449-458
    • Wu, Q.H.1    Mu, Y.2    Susilo, W.3
  • 16
    • 0242445175 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2002/098
    • J. Malone-Lee, "Identity-based signcryption" Cryptology ePrint Archive, Report 2002/098, 2002. http://eprint.iacr.org/.
    • (2002) Identity-based Signcryption
    • Malone-Lee, J.1
  • 19
    • 0000901529 scopus 로고    scopus 로고
    • Security Arguments for Digital Signatures and Blind Signatures
    • D. Pointcheval and J. Stern, "Security Arguments for Digital Signatures and Blind Signatures", Journal of Cryptology, vol.13, no. 3, pp.361-396, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.