Efficient proxy signcryption scheme with provable CCA and CMA security
From MaRDI portal
Publication:623106
DOI10.1016/j.camwa.2010.07.015zbMath1205.68150OpenAlexW2061597927WikidataQ115100068 ScholiaQ115100068MaRDI QIDQ623106
Publication date: 13 February 2011
Published in: Computers \& Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2010.07.015
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An efficient signcryption scheme with forward secrecy based on elliptic curve
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- ID-Based Blind Signature and Ring Signature from Pairings
- Hierarchical ID-Based Cryptography
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Information Security and Cryptology - ICISC 2003
- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
This page was built for publication: Efficient proxy signcryption scheme with provable CCA and CMA security