Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
The random oracle methodology, revisited (preliminary version)
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Formal Proofs for the Security of Signcryption
Journal of Cryptology
Identity based signcryption scheme without random oracles
Computer Standards & Interfaces
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Efficient signcryption without random oracles
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
ID based signcryption scheme in standard model
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Hi-index | 0.00 |
Signcryption, achieves confidentiality and authenticity simultaneously in an efficient manner, is a novel cryptographic primitive in a single logic step with more efficient computation and communication cost to support the security. In this paper, we analyze two identity based signcryption schemes under the without random oracles model including a signcryption scheme by Yu et al. [11] and a certificateless signcryption scheme by Liu et al. [12]. We give the chosen plaintext attacks to prove that the proposed previous schemes cannot resist on the indistinguishability on chosen ciphertext attack to support semantic secure for confidentiality.