نتایج جستجو برای: certificateless signcryption scheme

تعداد نتایج: 222882  

2005
Xinyi Huang Willy Susilo Yi Mu Futai Zhang

In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. In the new paradigm, the necessity of certificates has been successfully removed. The security model for certificateless cryptography was also introduced in the same paper. H...

Journal: :I. J. Network Security 2011
Hu Xiong Zhiguang Qin Fagen Li

Proxy ring signature allows proxy signer to sign messages on behalf of the original signer while providing anonymity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson in Asiacrypt 2003. In certificateless cryptography, it does not require the use of certificates to guarantee the authenticity of users’ public keys. Meanwhile, certificateless cryptography doe...

2005
Alexander W. Dent

The question of constructing a hybrid signcryption scheme with outside security was considered by Dent [7]. That paper also demonstrated that the basic hybrid construction formalised by Cramer and Shoup [5, 9] is incapable of producing a signcryption scheme with insider security. This paper provides a paradigm for constructing signcryption schemes with insider security based on the ideas of hyb...

2003
Divya Nalla

An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or strings derived from their identities. Signcryption combines digital signatures and encryption with a cost significantly smaller than that required for signature-thenencryption. This paper proposes an ID-based signcryption scheme based on bilinear pairings on elliptic cu...

Journal: :IACR Cryptology ePrint Archive 2004
Sherman S. M. Chow Tsz Hon Yuen Lucas Chi Kwong Hui Siu-Ming Yiu

In many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to “sign-then-encrypt” the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in [16]. The first one is to devise an efficient forward-secure ...

Journal: :IACR Cryptology ePrint Archive 2004
Noel McCullagh Paulo S. L. M. Barreto

Several signcryption schemes proposed in the literature are known to lack semantic security, and semantically secure signcryption schemes tend to be more computationally expensive. In fact, devising an efficient signcryption scheme providing both public verifiability and forward security was until now an open problem. In this paper, we show how a particular kind of signcryption scheme may becom...

Journal: :Inf. Sci. 2014
Lei Zhang Qianhong Wu Josep Domingo-Ferrer Bo Qin Peng Zeng

Recent years, lots of efforts have been devoted to construct secure schemes in certificateless cryptography which eliminates the key escrow problem in identity-based cryptography. However, most of them are designed in traditional certificateless cryptography which suffers from the single-point problem. Hierarchical cryptography exploits a practical security model to mirror the organizational hi...

Journal: :I. J. Network Security 2017
Yang Chen Yang Zhao Hu Xiong Feng Yue

The designated verifier signature only enables the designated verifier to check the correctness of the signature, while any third party can not verify whether this signature is valid or not. Most of the previous designated verifier signature schemes depend on certificate-based cryptography or identity-based cryptography, while little attention has been paid to the certificateless designated ver...

Journal: :IACR Cryptology ePrint Archive 2017
Nizamuddin Arif Iqbal Umar Abdul Waheed Noor Ul Amin

ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certi…cate management like Public Key Infrastructure. It has application in emerging paradigm big data security. Recently, Wei et al proposed a new ID based generalized signcryption scheme to obtain con…dentiality or/and authenticity in big...

2009
Lei Zhang Bo Qin Qianhong Wu Futai Zhang

We propose a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography. The scheme is proven existentially unforgeable against adaptive chosen-message attacks under the standard computational Diffie-Hellman assumption. Our scheme is also efficient in both communication and computation. The proposal is practica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید