Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient and provably secure multi-receiver identity-based signcryption
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Efficient identity-based signcryption scheme for multiple receivers
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption
Security and Communication Networks
Hi-index | 0.00 |
An identity-based threshold signcryption scheme for multiple receivers is proposed. For the n specified receivers, the ciphertext can be decrypted and verified when arbitrary t or more receivers work together. The steps of the private keys extraction, the signcryption, the decryption, and the verification are introduced in detail. The chosen-ciphertext security of the scheme is proved formally. The comparisons to the existing schemes show that the proposed scheme is more secure, more flexible, and the simulative game of the security proof in the scheme is more perfect. Copyright © 2010 John Wiley & Sons, Ltd.