Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Generalization of signcryption for resources-constrained environments: Research Articles
Wireless Communications & Mobile Computing - Advances in Resource-Constrained Device Networking
Proceedings of the 2008 ACM symposium on Information, computer and communications security
New ECDSA-Verifiable Multi-receiver Generalization Signcryption
HPCC '08 Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
Adaptive secure multicast in wireless networks
International Journal of Communication Systems - Secure communications and data management in ubiquitous services
BPGSC: Bilinear Paring Based Genearlized SignCryption Scheme
GCC '09 Proceedings of the 2009 Eighth International Conference on Grid and Cooperative Computing
Provable secure identity based generalized signcryption scheme
Theoretical Computer Science
Cryptanalysis of a certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA
IIH-MSP '10 Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
An efficient identity based generalized signcryption scheme
Theoretical Computer Science
ECGSC: elliptic curve based generalized signcryption
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained environments. In this paper, we introduce a formal security model for certificateless generalized signcryption schemes secure against the malicious-but-passive key generation center attacks and propose a novel scheme. Our scheme is proved to be IND-CCA2 secure under the GBDH assumption and CDH assumption and existentially unforgeable under the GDH' assumption and CDH assumption in random oracle model. Furthermore, performance analysis shows the proposed scheme is efficient and practical.