Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Distributed credential chain discovery in trust management
Journal of Computer Security
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Trust structures: Denotational and operational semantics
International Journal of Information Security
Formal Proofs for the Security of Signcryption
Journal of Cryptology
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
A security acceleration using XML signcryption scheme in mobile grid web services
ICWE'05 Proceedings of the 5th international conference on Web Engineering
A representation model of trust relationships with delegation extensions
iTrust'05 Proceedings of the Third international conference on Trust Management
Analysis and improvement of a signcryption scheme with key privacy
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient identity-based signcryption scheme for multiple receivers
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Trust management is a crucial approach to authenticate user and protect resource in distributed systems. Trust between two unknown parties in different autonomous domain is established based on the parties properties, by which are proven their qualifications through the disclosure of appropriate credentials. Assertion, described as well-defined uniformly semantic structure entities such as credentials, policies and requests, is encrypted by issuer or authority's public key. In this paper, we propose an efficient assertion security protect model based on signcryption scheme for multiple autonomous domain managers and privacy key generators(PKGs). We proved its security including confidentiality, unforgeability, public verifiability, and ciphertext anonymity under the DBDH assumption in the random oracle model, where the proposed scheme has comparable advantage in security and efficiency to other previous ID-based signcryption schemes in multiple PKGs.