Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
A Novel ID-Based Anonymous Signcryption Scheme
APWeb/WAIM '09 Proceedings of the Joint International Conferences on Advances in Data and Web Management
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Construction of identity based signcryption schemes
WISA'10 Proceedings of the 11th international conference on Information security applications
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Hi-index | 0.00 |
A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain certificates for their public keys. Identity-based signcryption (IBSC) applies the idea of IBC to signcryption. IBSC involves five security notions: message confidentiality, signature non-repudiation, ciphertext anonymity, ciphertext unlinkability, and ciphertext authentication. Recently, the Pandey scheme has been proposed; the scheme uses an identity-based encryption scheme and an identity-based signature scheme. However, this scheme only achieves message confidentiality and signature non-repudiation. In this work, we improve the scheme to achieve additional security notions, ciphertext anonymity and ciphertext authentication, with no loss in efficiency.