메뉴 건너뛰기




Volumn 167 AISC, Issue VOL. 2, 2012, Pages 713-725

Formal security verification of secured ECC based signcryption scheme

Author keywords

adversary; AVISPA; ECDLP; elliptic curve cryptography; Signcryption; unsigncryption

Indexed keywords

ADVERSARY; AVISPA; ECDLP; ELLIPTIC CURVE CRYPTOGRAPHY; SIGNCRYPTION; UNSIGNCRYPTION;

EID: 84865160722     PISSN: 18675662     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-30111-7_68     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 1
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption)
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 2
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption schemes on elliptic curves
    • Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227-233 (1998)
    • (1998) Information Processing Letters , vol.68 , Issue.5 , pp. 227-233
    • Zheng, Y.1    Imai, H.2
  • 4
    • 25144467465 scopus 로고    scopus 로고
    • An Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
    • Hwang, R.-J., Lai, C.-H., Su, F.-F.: An Efficient Signcryption Scheme With Forward Secrecy Based on Elliptic Curve. Applied Mathematics and Computation 167(2), 870-881 (2005)
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 870-881
    • Hwang, R.-J.1    Lai, C.-H.2    Su, F.-F.3
  • 5
    • 33947512019 scopus 로고    scopus 로고
    • Formal Proofs for the Security of Signcryption
    • Baek, J., Steinfeld, R., Zheng, Y.: Formal Proofs for the Security of Signcryption. Journal of Cryptology 20(2), 203-235 (2007)
    • (2007) Journal of Cryptology , vol.20 , Issue.2 , pp. 203-235
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 10
    • 0043135196 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem - The Answer to Strong, Fast Publickey Cryptography for Securing Constrained Environments
    • Vanstone, S.A.: Elliptic curve cryptosystem - The Answer to Strong, Fast Publickey Cryptography for Securing Constrained Environments. Information Security Technical Report 12(2), 78-87 (1997)
    • (1997) Information Security Technical Report , vol.12 , Issue.2 , pp. 78-87
    • Vanstone, S.A.1
  • 12
    • 84958960201 scopus 로고    scopus 로고
    • A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer
    • Imai, H., Zheng, Y. (eds.) PKC 1998. Springer, Heidelberg
    • Hasegawa, T., Nakajima, J., Matsui, M.: A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 182-194. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1431 , pp. 182-194
    • Hasegawa, T.1    Nakajima, J.2    Matsui, M.3
  • 13
    • 77954920932 scopus 로고    scopus 로고
    • An efficient dynamic group key agreement protocol for imbalanced wireless networks
    • Chuang, Y.-H., Tseng, Y.-M.: An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management 20(4), 167-180 (2010)
    • (2010) International Journal of Network Management , vol.20 , Issue.4 , pp. 167-180
    • Chuang, Y.-H.1    Tseng, Y.-M.2
  • 14
    • 43749092801 scopus 로고    scopus 로고
    • Provably Secure Constant Round Contributory Group Key Agreement
    • Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement. IEEE Transactions on Information Theory 54(5), 2007-2025 (2008)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.5 , pp. 2007-2025
    • Dutta, R.1    Barua, R.2
  • 16
    • 33646227667 scopus 로고    scopus 로고
    • Automated Security Protocol Analysis with the AVISPA Tool
    • Elsevier
    • Vigano, L.: Automated Security Protocol Analysis With the AVISPA Tool. Electronic Notes in Theoretical Computer Science, vol. 155, pp. 61-86. Elsevier (2006)
    • (2006) Electronic Notes in Theoretical Computer Science , vol.155 , pp. 61-86
    • Vigano, L.1
  • 17
    • 0019649307 scopus 로고
    • On the security of public key protocols
    • IEEE
    • Dolev, D., Yao, A.C.-C.: On the security of public key protocols. In: FOCS, pp. 350-357. IEEE (1981)
    • (1981) FOCS , pp. 350-357
    • Dolev, D.1    Yao, A.C.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.