Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
暂无分享,去创建一个
Jian Weng | Haifeng Qian | Xiangxue Li | Yu Yu | Hai-feng Qian | Xiangxue Li | J. Weng | Yu Yu
[1] Krste Asanovic,et al. Energy Aware Lossless Data Compression , 2003, MobiSys.
[2] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[3] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[4] Qiaoyan Wen,et al. An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..
[5] Bo Zhang,et al. Cryptanalysis of an Identity Based Signcryption Scheme without Random Oracles , 2010 .
[6] Ron Steinfeld,et al. A Signcryption Scheme Based on Integer Factorization , 2000, ISW.
[7] Pil Joong Lee,et al. New Signcryption Schemes Based on KCDSA , 2001, ICISC.
[8] Xing Wang,et al. Attacks against Two Identity-Based Signcryption Schemes , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[9] Fagen Li,et al. Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..
[10] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[11] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.
[12] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[13] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[14] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[16] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[17] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..