메뉴 건너뛰기




Volumn , Issue , 2003, Pages 155-158

A new identity based signcryption scheme from pairings

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SEMANTICS;

EID: 84939205648     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITW.2003.1216718     Document Type: Conference Paper
Times cited : (245)

References (36)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Advances in Cryptology-Eurocrypt'02 Springer
    • J.H. An, Y. Dodis, T. Rabin, On the security of joint signature and encryption, Advances in Cryptology-Eurocrypt'02, LNCS 2332, Springer, pp. 83-107, 2002.
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 84958982846 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • Proc. of PKC'02 Springer
    • J. Baek, R. Steinfeld, Y. Zheng, Formal Proofs for the Security of Signcryption, Proc. of PKC'02, LNCS 2274, Springer, pp. 81-98.
    • LNCS , vol.2274 , pp. 81-98
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 3
    • 84958948780 scopus 로고    scopus 로고
    • A signcryption scheme with signature directly verifiable by public key
    • Proc. of PKC'98 Springer
    • F. Bao, R.H. Deng, A signcryption scheme with signature directly verifiable by public key, Proc. of PKC'98, LNCS 1431, Springer, pp. 55-59, 1998.
    • (1998) LNCS , vol.1431 , pp. 55-59
    • Bao, F.1    Deng, R.H.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • Advances in Cryptology-Crypto'Ol Springer
    • D. Boneh, M. Franklin, Identity Based Encryption From the Weil Pairing, Advances in Cryptology-Crypto'Ol, LNCS 2139, Springer, 2001.
    • (2001) LNCS , vol.2139
    • Boneh, D.1    Franklin, M.2
  • 6
    • 1642409507 scopus 로고    scopus 로고
    • An identity-based signature from gap difie-hellman groups to appear
    • proceedings of PKC Springer-Verlag
    • J.C. Cha, J.H. Cheon, An Identity-Based Signature from Gap Difie-Hellman Groups, to appear in proceedings of PKC 2003. Springer Verlag, Lecture Notes in Computer Science series.
    • (2003) Lecture Notes in Computer Science
    • Cha, J.C.1    Cheon, J.H.2
  • 7
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Proc. of Cryptography and Coding Springer
    • C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, Proc. of Cryptography and Coding, LNCS 2260, Springer, pp. 360-363,2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 9
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Advances in Cryptology-Crypto'86 Springer
    • A. Fiat, A. Shamir, How to Prove Yourself: Practical Solutions to Identification and Signature Problems , Advances in Cryptology-Crypto'86, LNCS 0263, Springer, pp. 186-194, 1986.
    • (1986) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 10
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Advances in Cryptology-Crypto'99 Springer
    • E. Fujisaki, T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes", Advances in Cryptology-Crypto'99, LNCS 1666, Springer, pp.537-554, 1999.
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 35048817852 scopus 로고    scopus 로고
    • Encrypted message authentication by firewalls
    • Proc. of PKC'99 Springer
    • J C. Gamage, J. Leiwo, Y. Zheng, Encrypted message authentication by firewalls, Proc. of PKC'99, LNCS 1560, Springer, pp. 69-81, 1999
    • (1999) LNCS , vol.1560 , pp. 69-81
    • Gamage, J.C.1    Leiwo, J.2    Zheng, Y.3
  • 13
    • 84947558992 scopus 로고
    • A "paradoxical" identity-based signature scheme resulting from zero-knowledge
    • Advances in Cryptology-Crypto'88 Springer
    • L. Guillou, J-J. Quisquater, A "Paradoxical" Identity-Based Signature Scheme Resulting From Zero-Knowledge , Advances in Cryptology-Crypto'88, LNCS 0403, Springer, pp. 216-231, 1988
    • (1988) LNCS , vol.403 , pp. 216-231
    • Guillou, L.1    Quisquater, J.-J.2
  • 14
    • 84939128902 scopus 로고    scopus 로고
    • Eficient identity based signaiure schemes based on pairings, to appear
    • proceedings of SAC Springer-Verlag
    • F. Hess, Eficient identity based signaiure schemes based on pairings, to appear in proceedings of SAC 2002. Springer Verlag, Lecture Notes in Computer Science series.
    • (2002) Lecture Notes in Computer Science
    • Hess, F.1
  • 15
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Difie-Hellman
    • Proc. of ANTS-IV Springer
    • A. Jow, A one round protocol for tripartite Difie-Hellman, Proc. of ANTS-IV, Lecture Notes in Computer Science vol. 1838, Springer, pp. 385-394,2000.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 385-394
    • Jow, A.1
  • 20
    • 84939138314 scopus 로고    scopus 로고
    • Two birds one stone: Signcryption using RSA, to appear in proceedings of CT-RSA 2003
    • Springer Verlag
    • J. Malone-Lee, W. Mao, Two Birds one Stone: Signcryption using RSA, to appear in proceedings of CT-RSA 2003. Springer Verlag, Lecture Notes in Computer Science.
    • Lecture Notes in Computer Science
    • Malone-Lee, J.1    Mao, W.2
  • 21
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in afinitefield
    • A.J. Menezes, T. Okamoro, S. Vanstone, Reducing elliptic curve logarithms to logarithms in afinitefield, IEEE Trans. on Inf. Theory, vol. 39, pp. 1639-1646, 1993.
    • (1993) IEEE Trans. on Inf. Theory , vol.39 , pp. 1639-1646
    • Menezes, A.J.1    Okamoro, T.2    Vanstone, S.3
  • 23
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes, Advances in Cryptology-Eurocrypt'96
    • Springer
    • D. Pointcheval, J. Stern, Security proofs for signature schemes, Advances in Cryptology-Eurocrypt'96, LNCS 1070, Springer, pp. 387-398, 1996.
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 24
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, vol. 13-Number 3, pp. 361-396, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 26
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Advances in Cryptology-Crypto' 84 Springer
    • A. Shamir, Identity Based Cryptosystems and Signature Schemes, Advances in Cryptology-Crypto' 84, LNCS 0196, Springer, 1984.
    • (1984) LNCS , vol.196
    • Shamir, A.1
  • 27
    • 0037142442 scopus 로고    scopus 로고
    • Eleceonic Letters, 38(13): 630-632,2002
    • (2002) Eleceonic Letters , vol.38 , Issue.13 , pp. 630-632
  • 30
    • 84944242785 scopus 로고    scopus 로고
    • A signcryption scheme based on integer fuctorization
    • R. Steinfeld, Y. Zheng, A Signcryption Scheme Based on Integer Fuctorization, Proc. of ISW'OO, pp. 308-322, 2000.
    • (2000) Proc. of isw'Oo , pp. 308-322
    • Steinfeld, R.1    Zheng, Y.2
  • 31
    • 84949961454 scopus 로고    scopus 로고
    • New signcryption schemes based on KCDSA
    • Proc. of ICISC'O1 Springer
    • B.H. Yum, P.J. Lee, New Signcryption Schemes Based on KCDSA, Proc. of ICISC'O1, LNCS 2288, Springer, pp. 305-317,2001.
    • (2001) LNCS , vol.2288 , pp. 305-317
    • Yum, B.H.1    Lee, P.J.2
  • 32
    • 84958765355 scopus 로고    scopus 로고
    • ID-Based blind signature and ring signature from pairings. Advances in cryptology-asiacrypt'02
    • Y. Zheng ed., Springer-Verlag
    • E Zhang, K. Kim, ID-Based Blind Signature and Ring Signature from Pairings. Advances in Cryptology-Asiacrypt'02, Lecture Notes in Computer Science vol. 2501, Y. Zheng ed., Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501
    • Zhang, E.1    Kim, K.2
  • 33
    • 33644646469 scopus 로고    scopus 로고
    • Efiient signcryption schemes on elliptic curves
    • Chapman & Hall
    • Y. Zheng, H. Imai, Efiient Signcryption Schemes On Elliptic Curves, Proc. of IFIP/SEC'98, Chapman & Hall, 1998.
    • (1998) Proc. of IFIP/SEC'98
    • Zheng, Y.1    Imai, H.2
  • 34
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (Signature & Encryption) Cost (Signature) + Cost (Encryption)
    • Advances in Cryptology-Crypto'97 Springer
    • Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost (Signature) + Cost (Encryption), Advances in Cryptology-Crypto'97, LNCS 1294, Springer, pp. 165-179, 1997.
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 35
    • 84937414347 scopus 로고
    • Identi jication signature and signcryption using high order residues modulo an RSA composite
    • Proc. of PKC'O1 Springer
    • Y. Zheng, Identi Jication, Signature and Signcryption using High Order Residues Modulo an RSA Composite, Proc. of PKC'O1, LNCS 1992, Springer, pp. 48-63, 2001.
    • (1992) LNCS , vol.2001 , pp. 48-63
    • Zheng, Y.1
  • 36
    • 84947929166 scopus 로고    scopus 로고
    • Signcryption and its applications in eficient public key solutions
    • Y. Zheng, Signcryption and its applications in eficient public key solutions, Proc. of ISw97, pp. 291-312,1998.
    • (1998) Proc. of ISw , vol.97 , pp. 291-312
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.