Understanding signcryption security in standard model

[1]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[4]  Ming Li,et al.  Further Cryptanalysis of a Provably Secure CRT-RSA Algorithm , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[5]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[6]  Ji Geng,et al.  Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records , 2018, IEEE Access.

[7]  Musheer Ahmad,et al.  An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing , 2018, Journal of Medical Systems.

[8]  Somen Debnath,et al.  Study and Scope of Signcryption for Cloud Data Access Control , 2019, Advances in Computer, Communication and Control.

[9]  HuangXinyi,et al.  Secure sharing of Personal Health Records in cloud computing , 2015 .

[10]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[11]  Mário M. Freire,et al.  Challenges of securing Internet of Things devices: A survey , 2018, Secur. Priv..

[12]  Ming Luo,et al.  An Enhanced Certificateless Signcryption in the Standard Model , 2017, Wireless Personal Communications.

[13]  Mohammad S. Obaidat,et al.  Security analysis on "mutual authentication scheme for multimedia medical information systems" , 2019, Secur. Priv..

[14]  Zongmin Cui,et al.  Certificateless Signcryption in the Standard Model , 2017, Wirel. Pers. Commun..

[15]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[16]  Mohammad S. Obaidat,et al.  Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography , 2018, Secur. Priv..

[17]  Hu Junru,et al.  An efficient signcryption scheme with shortened ciphertext , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[18]  Chunhua Jin,et al.  Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.

[19]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[20]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[21]  Joseph K. Liu,et al.  Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..

[22]  Fagen Li,et al.  Heterogeneous signcryption with keyword search for wireless body area network , 2018, Secur. Priv..

[23]  Yali Wang,et al.  Revocable Cloud-Assisted Attribute-Based Signcryption in Personal Health System , 2019, IEEE Access.

[24]  Fagen Li,et al.  Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.

[25]  Mohamed Mohamed,et al.  C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications , 2018, 2018 IEEE International Conference on Services Computing (SCC).

[26]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[27]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..

[28]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[29]  Sai Ji,et al.  A Novel Certificateless Signcryption for E-Health Record System , 2018, 2018 1st International Cognitive Cities Conference (IC3).

[30]  David Naccache,et al.  Secure and Practical Identity-based Encryption , 2005 .

[31]  Qian Xu,et al.  Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption , 2018, IEEE Access.

[32]  Xu An Wang,et al.  Cryptanalysis of Efficient Identity Based Signature/Signcryption Schemes in the Standard Model , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[33]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[34]  Naveen K. Chilamkurti,et al.  On the security of a certificateless online/offline signcryption for Internet of Things , 2014, Peer-to-Peer Networking and Applications.

[35]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[36]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[37]  Yong Yu,et al.  Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.

[38]  Zhenhua Liu,et al.  Searchable Attribute-Based Signcryption Scheme for Electronic Personal Health Record , 2018, IEEE Access.

[39]  Ruhul Amin,et al.  An overview of cloud‐fog computing: Architectures, applications with security challenges , 2019, Security and Privacy.

[40]  Fagen Li,et al.  Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..

[41]  Fagen Li,et al.  Further improvement of an identity-based signcryption scheme in the standard model , 2012, Comput. Electr. Eng..

[42]  Xiangyu Meng,et al.  A novel attribute-based signcryption scheme in cloud computing environments , 2016, 2016 IEEE International Conference on Information and Automation (ICIA).

[43]  Y. Sreenivasa Rao,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..

[44]  Fagen Li,et al.  HOOSC: heterogeneous online/offline signcryption for the Internet of Things , 2018, Wirel. Networks.

[45]  Wei Luo,et al.  Secure and Efficient Data Sharing Scheme Based on Certificateless Hybrid Signcryption for Cloud Storage , 2019, Electronics.

[46]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[47]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[48]  Jianfeng Xu,et al.  A security communication model based on certificateless online/offline signcryption for Internet of Things , 2014, Secur. Commun. Networks.

[49]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[50]  Maryline Laurent-Maknavicius,et al.  Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[51]  Rongxing Lu,et al.  Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption , 2015, Inf. Sci..

[52]  Jian Weng,et al.  Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model , 2013, Math. Comput. Model..

[53]  Md Zakirul Alam Bhuiyan,et al.  Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.

[54]  XuJianfeng,et al.  A security communication model based on certificateless online/offline signcryption for Internet of Things , 2014 .

[55]  Abderrazak Jemai,et al.  Constant-size Threshold Attribute based SignCryption for Cloud Applications , 2017, SECRYPT.