Understanding signcryption security in standard model
暂无分享,去创建一个
[1] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Ming Li,et al. Further Cryptanalysis of a Provably Secure CRT-RSA Algorithm , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[5] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[6] Ji Geng,et al. Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records , 2018, IEEE Access.
[7] Musheer Ahmad,et al. An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing , 2018, Journal of Medical Systems.
[8] Somen Debnath,et al. Study and Scope of Signcryption for Cloud Data Access Control , 2019, Advances in Computer, Communication and Control.
[9] HuangXinyi,et al. Secure sharing of Personal Health Records in cloud computing , 2015 .
[10] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[11] Mário M. Freire,et al. Challenges of securing Internet of Things devices: A survey , 2018, Secur. Priv..
[12] Ming Luo,et al. An Enhanced Certificateless Signcryption in the Standard Model , 2017, Wireless Personal Communications.
[13] Mohammad S. Obaidat,et al. Security analysis on "mutual authentication scheme for multimedia medical information systems" , 2019, Secur. Priv..
[14] Zongmin Cui,et al. Certificateless Signcryption in the Standard Model , 2017, Wirel. Pers. Commun..
[15] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[16] Mohammad S. Obaidat,et al. Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography , 2018, Secur. Priv..
[17] Hu Junru,et al. An efficient signcryption scheme with shortened ciphertext , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[18] Chunhua Jin,et al. Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.
[19] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.
[20] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[21] Joseph K. Liu,et al. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..
[22] Fagen Li,et al. Heterogeneous signcryption with keyword search for wireless body area network , 2018, Secur. Priv..
[23] Yali Wang,et al. Revocable Cloud-Assisted Attribute-Based Signcryption in Personal Health System , 2019, IEEE Access.
[24] Fagen Li,et al. Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.
[25] Mohamed Mohamed,et al. C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications , 2018, 2018 IEEE International Conference on Services Computing (SCC).
[26] Qiaoyan Wen,et al. An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..
[27] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[28] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[29] Sai Ji,et al. A Novel Certificateless Signcryption for E-Health Record System , 2018, 2018 1st International Cognitive Cities Conference (IC3).
[30] David Naccache,et al. Secure and Practical Identity-based Encryption , 2005 .
[31] Qian Xu,et al. Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption , 2018, IEEE Access.
[32] Xu An Wang,et al. Cryptanalysis of Efficient Identity Based Signature/Signcryption Schemes in the Standard Model , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.
[33] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[34] Naveen K. Chilamkurti,et al. On the security of a certificateless online/offline signcryption for Internet of Things , 2014, Peer-to-Peer Networking and Applications.
[35] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[36] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[37] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.
[38] Zhenhua Liu,et al. Searchable Attribute-Based Signcryption Scheme for Electronic Personal Health Record , 2018, IEEE Access.
[39] Ruhul Amin,et al. An overview of cloud‐fog computing: Architectures, applications with security challenges , 2019, Security and Privacy.
[40] Fagen Li,et al. Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..
[41] Fagen Li,et al. Further improvement of an identity-based signcryption scheme in the standard model , 2012, Comput. Electr. Eng..
[42] Xiangyu Meng,et al. A novel attribute-based signcryption scheme in cloud computing environments , 2016, 2016 IEEE International Conference on Information and Automation (ICIA).
[43] Y. Sreenivasa Rao,et al. A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..
[44] Fagen Li,et al. HOOSC: heterogeneous online/offline signcryption for the Internet of Things , 2018, Wirel. Networks.
[45] Wei Luo,et al. Secure and Efficient Data Sharing Scheme Based on Certificateless Hybrid Signcryption for Cloud Storage , 2019, Electronics.
[46] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[47] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[48] Jianfeng Xu,et al. A security communication model based on certificateless online/offline signcryption for Internet of Things , 2014, Secur. Commun. Networks.
[49] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[50] Maryline Laurent-Maknavicius,et al. Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[51] Rongxing Lu,et al. Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption , 2015, Inf. Sci..
[52] Jian Weng,et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model , 2013, Math. Comput. Model..
[53] Md Zakirul Alam Bhuiyan,et al. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.
[54] XuJianfeng,et al. A security communication model based on certificateless online/offline signcryption for Internet of Things , 2014 .
[55] Abderrazak Jemai,et al. Constant-size Threshold Attribute based SignCryption for Cloud Applications , 2017, SECRYPT.