Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme
ICISC '99 Proceedings of the Second International Conference on Information Security and Cryptology
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
A Signcryption Scheme with Signature Directly Verifiable by Public Key
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Formal Proofs for the Security of Signcryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
CNSR '04 Proceedings of the Second Annual Conference on Communication Networks and Services Research
Two birds one stone: signcryption using RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
ISSRP: a secure routing protocol using identity-based signcryption scheme in ad-hoc networks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
A new scheme for key management in ad hoc networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Enhanced ID-Based authenticated key agreement protocols for a multiple independent PKG environment
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Identity-Based key agreement protocols in a multiple PKG environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
Information Security and Cryptology
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
Hi-index | 0.00 |
As various applications of wireless ad hoc networks have been proposed, security has become one of the big research challenges and is receiving increasing attention. Recently, Several security schemes for wireless ad hoc networks have been proposed using identity-based signcryption schemes. However, almost all identity-based signcryption schemes that have been proposed until now are based on a single private key generator, which is not suitable for multi-domain ad hoc networks. In this paper, we propose a new identity-based signcryption scheme based on multiple private key generators, which is more suitable for multi-domain ad hoc networks. We prove its semantical security under the Decisional Bilinear Diffie-Hellman assumption in the random oracle model.