How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Signcryption Scheme with Signature Directly Verifiable by Public Key
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Two birds one stone: signcryption using RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Efficient identity based ring signature
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A ring signature scheme using bilinear pairings
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
New directions in cryptography
IEEE Transactions on Information Theory
On the Security of Identity Based Ring Signcryption Schemes
ISC '09 Proceedings of the 12th International Conference on Information Security
A novel anonymous proxy signature scheme
Advances in Multimedia
Hi-index | 0.00 |
This study presents an elliptic curve cryptosystem-based signcryption scheme with anonymity features. The scheme possesses the properties of elliptic curve cryptosystem and ring signature. While the technique of ring signature endows the signers with anonymity, the elliptic curve cryptosystem provides advantages like high security, low computation load, and small bandwidth requirements. Integrating the advantages of these two applications, the outcome is a highly secure and efficient anonymous signcryption scheme. Signcryption does not require an advance establishment of session key for each session. Thus, transmission load is reduced, and efficiency of performance and transmission enhanced.