Efficient Identity-Based Signcryption in the Standard Model
From MaRDI portal
Publication:3092353
DOI10.1007/978-3-642-24316-5_10zbMath1298.94093OpenAlexW138713692MaRDI QIDQ3092353
Tsuyoshi Takagi, Mingwu Zhang, Fahad bin Muhaya, Fa-Gen Li
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_10
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Formal proofs for the security of signcryption
- An improved semantically-secure identity-based signcryption scheme in the standard model
- Identity-Based Cryptosystems and Signature Schemes
- The random oracle methodology, revisited
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity Based Public Verifiable Signcryption Scheme
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Advances in Cryptology - CRYPTO 2003
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Public Key Cryptography - PKC 2005
- Information Security and Cryptology - ICISC 2003
- Efficient Identity-Based Signatures Secure in the Standard Model
This page was built for publication: Efficient Identity-Based Signcryption in the Standard Model