A signcryption scheme is a scheme that provides private and authenticated delivery of messages between two parties. It does this in a more efficient manner than a straightforward composition of an encryption scheme with a signature scheme. An identity-based cryptosystem is one in which the public ...
hierarchical identity-based signcryption, fully secure, constant-size ciphertext, composite order bilinear groupp class=MsoNormal style=margin: 0cm 0cm 0pt; mso-layout-grid-align: none;span style=font-size: 9pt; mso-bidi-font-weight: bold;span style=font-family: Times New Roman;In this ...
研究点推荐 Identity-Based Signcryption identity-based IB cryptography public key PK cryptography 0关于我们 百度学术集成海量学术资源,融合人工智能、深度学习、大数据分析等技术,为科研工作者提供全面快捷的学术服务。在这里我们保持学习的态度,不忘初心,砥砺前行。了解更多>>...
proposed an efficient identity-based signcryption scheme and declared that this scheme had the attributes of privacy, unforgeability, public verifiability, repudiation and forward security. After detailed analysis, we find that scheme does not meet the attributes which the authorrsquo;s declared. ...
An efficient alternative method is multi-signcryption. In this paper, we propose an efficient identity based multi-signcryption scheme with public verifiability. This scheme provides the functionalities of both multi signatures and secure encryption for multiple senders; and these schemes enables to ...
Identity-based signcryption (IBSC) is a cryptographic primitive which combines both the functions of identity-based signature and identity-based encryption in a single logical step, but with the cost of computation and communication significantly less than those needed by the signature-then-encryption ...
C. Yuan, W. Chen, and D. Li, "A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network," in 11th China Conference on Wireless Sensor Network (CWSN 2017), 2017.Yuan, C.; Chen, W.; Li, D. A Hierarchical Identity-Based Signcryption Scheme in Underwater ...
Signcryption, which was introduced by ZHENG, is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more efficient way. Certificateless signcryption and proxy signcryption in identity-based cryptograph...
proposed the first identity-based signcryption scheme without random oracles and proved it was semantically secure in the standard model. However, in this paper we find that their scheme actually does not reach the semantic security as they claimed. To make up for this defect, we propose a ...
An identity-based encryption (IBE) scheme (see alsoidentity-based cryptography) is apublic keyencryption scheme in which the public key can be an arbitrary string. For example, if Alice wants to send a message to Bob at bob@yahoo.com, she simply encrypts the message using the string “bob...