메뉴 건너뛰기




Volumn 6980 LNCS, Issue , 2011, Pages 120-137

Efficient identity-based signcryption in the standard model

Author keywords

Identity based cryptography; signcryption; standard model

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; CRYPTOGRAPHIC PRIMITIVES; DIFFIE-HELLMAN ASSUMPTION; DIGITAL SIGNATURE; IDENTITY BASED CRYPTOGRAPHY; IDENTITY-BASED SIGNCRYPTION; IDENTITY-BASED SIGNCRYPTION SCHEME; INDISTINGUISHABILITY; MOBILE COMMUNICATIONS; OPEN PROBLEMS; PUBLIC-KEY ENCRYPTION; SIGNCRYPTION; STANDARD MODEL; THE STANDARD MODEL; UNFORGEABILITY;

EID: 80053168695     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24316-5_10     Document Type: Conference Paper
Times cited : (13)

References (29)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg(1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 3
    • 84947558992 scopus 로고
    • A "Paradoxical" identity-based signature scheme resulting from zero-knowledge
    • Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
    • Guillou, L.C., Quisquater, J.-J.: A "Paradoxical" identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 216-231
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost(Encryption)
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 6
    • 33947512019 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. Journal of Cryptology 20(2), 203-235 (2007)
    • (2007) Journal of Cryptology , vol.20 , Issue.2 , pp. 203-235
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 7
    • 84958948780 scopus 로고    scopus 로고
    • A signcryption scheme with signature directly verifiable by public key
    • Public Key Cryptography
    • Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55-59. Springer, Heidelberg (1998) (Pubitemid 128101696)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1431 , pp. 55-59
    • Bao, F.1    Deng, R.H.2
  • 8
    • 84944242785 scopus 로고    scopus 로고
    • A Signcryption Scheme Based on Integer Factorization
    • Steinfeld, R., Zheng, Y.: A signcryption scheme based on integer factorizatio. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975, pp. 308-322. Springer, Heidelberg (2000) (Pubitemid 33209765)
    • (2000) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1975 , pp. 308-322
    • Steinfeld, R.1    Zheng, Y.2
  • 9
    • 34347373013 scopus 로고    scopus 로고
    • Two birds one stone: Signcryption using RSA
    • Joye, M. (ed.) CT-RSA 2003. Springer, Heidelberg
    • Malone-Lee, J., Mao, W.: Two birds one stone: Signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211-225. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2612 , pp. 211-225
    • Malone-Lee, J.1    Mao, W.2
  • 10
    • 0242445175 scopus 로고    scopus 로고
    • Identity based signcryption
    • Report 2002/098
    • Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive, Report 2002/098 (2002), http://eprint.iacr.org/2002/098
    • (2002) Cryptology ePrint Archive
    • Malone-Lee, J.1
  • 12
    • 35048854673 scopus 로고    scopus 로고
    • Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    • Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. Springer, Heidelberg
    • Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2971 , pp. 352-369
    • Chow, S.S.M.1    Yiu, S.M.2    Hui, L.C.K.3    Chow, K.P.4
  • 13
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Boyen, X.: Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 383-399
    • Boyen, X.1
  • 14
    • 24144498013 scopus 로고    scopus 로고
    • Improved identity-based signcryption
    • Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
    • Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362-379. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3386 , pp. 362-379
    • Chen, L.1    Malone-Lee, J.2
  • 16
    • 78449258686 scopus 로고    scopus 로고
    • Identity based public verifiable signcryption scheme
    • Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. Springer, Heidelberg
    • Selvi, S.S.D., Sree Vivek, S., Pandu Rangan, C.: Identity based public verifiable signcryption scheme. In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol. 6402, pp. 244-260. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6402 , pp. 244-260
    • Selvi, S.S.D.1    Sree Vivek, S.2    Pandu Rangan, C.3
  • 18
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 171-188. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 19
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 20
    • 54349101206 scopus 로고    scopus 로고
    • Identity based signcryption scheme without random oracles
    • Yu, Y., Yang, B., Sun, Y., Zhu, S.: Identity based signcryption scheme without random oracles. Computer Standards & Interfaces 31(1), 56-62 (2009)
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 56-62
    • Yu, Y.1    Yang, B.2    Sun, Y.3    Zhu, S.4
  • 21
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 23
    • 77950628145 scopus 로고    scopus 로고
    • An improved semantically-secure identity-based signcryption scheme in the standard model
    • Jin, Z., Wen, Q., Du, H.: An improved semantically-secure identity-based signcryption scheme in the standard model. Computers & Electrical Engineering 36(3), 545-552 (2010)
    • (2010) Computers & Electrical Engineering , vol.36 , Issue.3 , pp. 545-552
    • Jin, Z.1    Wen, Q.2    Du, H.3
  • 25
    • 77956956687 scopus 로고    scopus 로고
    • Cryptanalysis of an identity based signcryption scheme without random oracles
    • Zhang, B.: Cryptanalysis of an identity based signcryption scheme without random oracles. Journal of Computational Information Systems 6(6), 1923-1931 (2010)
    • (2010) Journal of Computational Information Systems , vol.6 , Issue.6 , pp. 1923-1931
    • Zhang, B.1
  • 27
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 28
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Report 2004/332
    • Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr. org/2004/332
    • (2004) Cryptology ePrint Archive
    • Shoup, V.1
  • 29
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Shoup, V.: OAEP reconsidered. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 239-259. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 239-259
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.