Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Two proxy signcryption schemes from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient identity based proxy-signcryption schemes with forward security and public verifiability
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Software Service Signature (S3) for authentication in cloud computing
Cluster Computing
Hi-index | 0.00 |
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. A signcryption is a primitive that provides private and authenticated delivery of messages between two parties. Proxy signature schemes are variations of ordinary digital signature schemes and have been shown to be useful in many applications. In this paper, We proposed an identity based proxy-signcryption scheme from pairings. Also we analyze the proposed scheme from efficiency and security points of view. Heuristic arguments have been given for those security properties. We have shown that the proxy-signcryption scheme is as efficient as ordinary identity based signcryption schemes under certain circumstances.