نتایج جستجو برای: certificateless signcryption scheme

تعداد نتایج: 222882  

Journal: :IEICE Transactions 2005
Chik How Tan

The concept of a signcryption scheme is proposed by Zheng in 1997 [5]. Since then, there are many signcryption schemes proposed. It is only recently that a formal security proof model [1] is formalized providing security proof for Zheng’s scheme [5] in the random oracle model. In 2003, Boyen [3] proposed a secured identity-based signcryption scheme with ciphertext anonymity and provable secure ...

2011
Fenghe Wang Yupu Hu Chunxiao Wang

Motivated by the demand to have secure signcryption scheme, even in quantum era, the concept of signcryption tag-KEM (key encapsulation machine) is extended to lattice cryptography in this paper. A lattice-based hybrid signcryption scheme is proposed by building a lattice-based signcryption tag-KEM. Based on the hardness of the learning with errors problem and the short integer solution problem...

2014
Wei Zhang

In this work, we study the cryptographic primitive: signcryption, which combines the functionalities of digital signatures and public-key encryption. We first propose two generic transforms from meta-ElGamal signature schemes to signcryption schemes. These constructions can be thought of as generalisations of the signcryption schemes by Zheng and Gamage et al. Our results show that a large clas...

Journal: :IACR Cryptology ePrint Archive 2008
Sunder Lal Prashant Kushwah

Generalized signcryption is a new cryptographic primitive in which a signcryption scheme can work as an encryption scheme as well as a signature scheme. This paper presents an identity based generalized signcryption scheme based on bilinear pairing and discusses its security for message confidentiality non repudiation and ciphertext authentication.

Journal: :IACR Cryptology ePrint Archive 2009
Sunder Lal Prashant Kushwah

This paper presents an efficient and provable secure identity based generalized signcryption scheme based on [1] which can work as signcryption scheme, encryption scheme and signature scheme as per need. Its security is proved under the difficulty of q-BDHIP. A generalized signcryption scheme in multiple PKGs environment is also proposed.

2015
An Braeken Pawani Porambage

In order to obtain promising wireless communication systems, it is necessary to maintain secure message transmissions in unicast, multicast, or broadcast scenarios. The cryptographic primitives can be incorporated when a node needs to submit messages to different receivers as encrypted and/or authenticated one-way messages. For achieving the given objective, signcryption schemes are efficient p...

2012
G. Swapna P. V. S. S. N. Gopal T. Gowri P. Vasudeva Reddy

Received June 30 th , 2012 Revised July 10 th , 2012 Accepted July 22 th , 2012 Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step, at lower computational cost and communication over heads than the signature-then-encryption. Proxy signcryption schemes are variations of ordinary signcryption schemes and have been useful in many applications ...

2012
Xiaoqin Shen

Certificateless signature scheme eliminates the need of certificates in the traditional signature scheme and solves the inherent key escrow problem in the identity based signature scheme. In this paper, we propose a new construction of certificateless signature which is strongly unforgeable in the standard model with the computational Diffie-Hellman assumption in bilinear groups. As far as we k...

Journal: :I. J. Network Security 2016
Chin-Chen Chang Chin-Yu Sun Shih-Chang Chang

The certificateless-based signature system allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority (CA) to store and manage users’ certificates and public keys. Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system. In 2012, Zhang and Mao...

Journal: :IACR Cryptology ePrint Archive 2011
Caixue Zhou

Generalized signcryption(GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. In this paper, the formal definition and security notions of multi-receiver identity-based generalized signcryption (MID-GSC) are defined. A concrete scheme is also proposed and proved to be confidential under the Bilinear Diffie-Hellman (BDH) assumptio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید