메뉴 건너뛰기




Volumn 3, Issue 3, 2012, Pages 240-251

A revocable ID-based signcryption scheme

Author keywords

Bilinear pairings; Cryptography; Identity based; Revocation; Signcryption

Indexed keywords

BILINEAR PAIRING; CRYPTOGRAPHIC PRIMITIVES; IDENTITY-BASED; PUBLIC KEY SYSTEMS; REVOCATION; REVOCATION MECHANISM; SIGNCRYPTION; SIGNCRYPTION SCHEMES;

EID: 84871225971     PISSN: 20734212     EISSN: 20734239     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (21)

References (39)
  • 1
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost(signature + encryption) << cost(signature) + cost(encryption)
    • Y. Zheng, Digital signcryption or how to achieve cost(signature + encryption) << cost(signature) + cost(encryption), Proc. of 17th Annual International Cryptology Conference, pp. 165-179, 1997.
    • (1997) Proc. of 17th Annual International Cryptology Conference , pp. 165-179
    • Zheng, Y.1
  • 2
    • 0040712314 scopus 로고    scopus 로고
    • Efficient signcryption schemes on elliptic curves
    • Y. Zheng and H. Imai, Efficient signcryption schemes on elliptic curves, Information Processing Letters, vol. 68, no. 5, pp. 227-233, 1998.
    • (1998) Information Processing Letters , vol.68 , Issue.5 , pp. 227-233
    • Zheng, Y.1    Imai, H.2
  • 4
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
    • X. Boyen, Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography, Proc. of 23rd Annual International Cryptology Conference, pp. 383-399, 2003.
    • (2003) Proc. of 23rd Annual International Cryptology Conference , pp. 383-399
    • Boyen, X.1
  • 10
    • 0041291986 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • R. Housley, W. Polk, W. Ford, and D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, The Internet Society, 2002.
    • (2002) The Internet Society
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 12
    • 24944532382 scopus 로고    scopus 로고
    • Novomodo: Scalable certificate validation and simplified PKI management
    • S. Micali, Novomodo: scalable certificate validation and simplified PKI management, Proc. of 1st Annual PKI Research Workshop, pp. 15-25, 2002.
    • (2002) Proc. of 1st Annual PKI Research Workshop , pp. 15-25
    • Micali, S.1
  • 24
    • 77955703761 scopus 로고    scopus 로고
    • An ID-based mutual authentication and key exchange protocol for low-power mobile devices
    • T. Y. Wu and Y. M. Tseng, An ID-based mutual authentication and key exchange protocol for low-power mobile devices, The Computer Journal, vol. 53, no. 7, pp. 1062-1070, 2010.
    • (2010) The Computer Journal , vol.53 , Issue.7 , pp. 1062-1070
    • Wu, T.Y.1    Tseng, Y.M.2
  • 25
    • 77955659710 scopus 로고    scopus 로고
    • An efficient user authentication and key exchange protocol for mobile client-server environment
    • T. Y. Wu and Y. M. Tseng, An efficient user authentication and key exchange protocol for mobile client-server environment, Journal of Computer Networks, vol. 54, no. 9, pp. 1520-1530, 2010.
    • (2010) Journal of Computer Networks , vol.54 , Issue.9 , pp. 1520-1530
    • Wu, T.Y.1    Tseng, Y.M.2
  • 27
    • 79958112453 scopus 로고    scopus 로고
    • A secure ID-based authenticated group key exchange protocol resistant to insider attacks
    • T. Y. Wu, Y. M. Tseng, and C. W. Yu, A secure ID-based authenticated group key exchange protocol resistant to insider attacks, Journal of Information Science and Engineering, vol. 27, pp. 915-932, 2011.
    • (2011) Journal of Information Science and Engineering , vol.27 , pp. 915-932
    • Wu, T.Y.1    Tseng, Y.M.2    Yu, C.W.3
  • 28
    • 84863643575 scopus 로고    scopus 로고
    • Towards ID-based authenticated group key exchange protocol with identifying malicious participants
    • T. Y. Wu and Y. M. Tseng, Towards ID-based authenticated group key exchange protocol with identifying malicious participants, Journal of Informatica, vol. 23, no. 2, pp. 315-334, 2012.
    • (2012) Journal of Informatica , vol.23 , Issue.2 , pp. 315-334
    • Wu, T.Y.1    Tseng, Y.M.2
  • 29
    • 64249165649 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • M. Bellare, C. Namprempre, and G. Neven, Security proofs for identity-based identification and signature schemes, Journal of Cryptology, vol. 22, no. 1, pp. 1-61, 2009.
    • (2009) Journal of Cryptology , vol.22 , Issue.1 , pp. 1-61
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 30
    • 47949104161 scopus 로고    scopus 로고
    • A pairing-based user authentication scheme for wireless clients with smart cards
    • Y. M. Tseng, T. Y. Wu, and J. D. Wu, A pairing-based user authentication scheme for wireless clients with smart cards, Journal of Informatica, vol. 19, no. 2, pp. 285-302, 2008.
    • (2008) Journal of Informatica , vol.19 , Issue.2 , pp. 285-302
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 33
    • 84859342049 scopus 로고    scopus 로고
    • Efficient revocable ID-based encryption with a public channel
    • Y. M. Tseng and T. T. Tsai, Efficient revocable ID-based encryption with a public channel, The Computer Journal, vol. 55, no. 4, pp. 475-486, 2012.
    • (2012) The Computer Journal , vol.55 , Issue.4 , pp. 475-486
    • Tseng, Y.M.1    Tsai, T.T.2
  • 35
    • 84863621901 scopus 로고    scopus 로고
    • A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
    • T. Y. Wu, Y. M. Tseng, and T. T. Tsai, A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants, Journal of Computer Networks, vol. 56, no. 12, pp. 2994-3006, 2012.
    • (2012) Journal of Computer Networks , vol.56 , Issue.12 , pp. 2994-3006
    • Wu, T.Y.1    Tseng, Y.M.2    Tsai, T.T.3
  • 37
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology, revisited, Journal of ACM, vol. 51, no. 4, pp. 557-594, 2004.
    • (2004) Journal of ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.