Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Signcryption Scheme with Signature Directly Verifiable by Public Key
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Efficient Constructions of Signcryption Schemes and Signcryption Composability
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Verifiably Encrypted Signatures from RSA without NIZKs
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
New DSA-verifiable signcryption schemes
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Predicate encryption supporting disjunctions, polynomial equations, and inner products
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Generic constructions for verifiably encrypted signatures without random oracles or NIZKs
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Identity based public verifiable signcryption scheme
ProvSec'10 Proceedings of the 4th international conference on Provable security
Verifiable pairing and its applications
WISA'04 Proceedings of the 5th international conference on Information Security Applications
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Hi-index | 0.00 |
We propose a new cryptographic notion called accountable decryption by which, given a ciphertext, a decryptor proves both the correctness of his decryption and the plaintext authenticity to a public verifier. We define its security from three aspects: message confidentiality, soundness of verifiability and plaintext authenticity. Given any asymmetric or symmetric key encryption scheme, we propose a method to construct the corresponding accountable decryption scheme with provable security. To demonstrate its applications, we also present the constructions for predicate encryption and for public-key encryption with keyword search.