نتایج جستجو برای: certificateless signcryption scheme

تعداد نتایج: 222882  

Journal: :IEICE Transactions 2007
Chik How Tan

In this paper, we analyse Ma signcryption scheme [4] proposed in Inscrypt’2006. Although Ma signcryption scheme [4] is probably secure against adaptive chosen ciphertext attacks and forgery, we show that Ma signcryption scheme is easily forgeable by the receiver and the receiver can impersonate the sender to forge any valid signcryption to any receiver. key words: cryptography, signcryption

Journal: :IACR Cryptology ePrint Archive 2007
Xu An Wang Xiaoyuan Yang Jindan Zhang

Generalized Signcryption is a new cryptographic primitive which can work as an encryption scheme, a signature scheme or a signcryption scheme. We give security notions of Generalized Signcryption and improve a Generalized Signcryption scheme proposed by Han et al.We give the formal attacking model of this new cryptographic primitive in the framework of theory of provable security. At last, we g...

2002
Ik Rae Jeong Hee Yun Jeong Hyun Sook Rhee Dong Hoon Lee Jongin Lim

To make authenticated encryption which provides confidentiality and authenticity of a message simultaneously, a signcryption scheme uses asymmetric primitives, such as an asymmetric encryption scheme for confidentiality and a signature scheme for authentication. Among the signcryption schemes, the hybrid signcryption schemes are the signcryption schemes that use a key agreement scheme to exchan...

Journal: :IACR Cryptology ePrint Archive 2008
Fagen Li Masaaki Shirase Tsuyoshi Takagi

Ring signcryption is an anonymous signcryption which allows a user to anonymously signcrypt a message on behalf of a set of users including himself. In an ordinary ring signcryption scheme, even if a user of the ring generates a signcryption, he also cannot prove that the signcryption was produced by himself. In 2008, Zhang, Yang, Zhu, and Zhang solve the problem by introducing an identity-base...

2005
Alexander W. Dent

This paper expands the notion of a KEM–DEM hybrid encryption scheme to the signcryption setting by introducing the notion of a signcryption KEM, a signcryption DEM and a hybrid signcryption scheme. We present the security criteria that a signcryption KEM and DEM must satisfy in order that the overall signcryption scheme is secure against outsider attacks. We also present ECISS–KEM — a simple, e...

Journal: :Wireless Communications and Mobile Computing 2021

With the rapid development of Internet Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into management system with processing and storage composed multiple servers. However, a large amount sensitive data contained devices is transmitted under actual wireless network environment will cause series security issues become...

2010
Chul Sur Chae Duk Jung Youngho Park Kyung Hyune Rhee

In this paper we introduce the notion of certificateless proxy re-encryption and also give precise definitions for secure certificateless proxy re-encryption schemes. We present a concrete scheme based on bilinear pairing, which enjoys the advantages of certificateless public key cryptography while providing the functionalities of proxy re-encryption. Moreover, the proposed scheme is unidirecti...

Journal: :J. Internet Serv. Inf. Secur. 2016
S. Sree Vivek S. Sharmila Deva Selvi Pallavi Chandrasekar C. Pandu Rangan

Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals the committed value later during a decommit phase. In this paper, we explore the connection between commitment schemes, public key encryption,...

2014
Yang Lu Jiguo Li

Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید