Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Signcryption Scheme in Multi-user Setting without Random Oracles
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Efficient Signcryption Key Encapsulation without Random Oracles
Information Security and Cryptology
Signcryption from randomness recoverable public key encryption
Information Sciences: an International Journal
Efficient Constructions of Signcryption Schemes and Signcryption Composability
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
An improved semantically-secure identity-based signcryption scheme in the standard model
Computers and Electrical Engineering
On the connection between signcryption and one-pass key establishment
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Analysis and improvement of an ID-based anonymous signcryption model
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
Strong designated verifier signature in a multi-user setting
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Fully secure threshold unsigncryption
ProvSec'10 Proceedings of the 4th international conference on Provable security
Efficient generic constructions of signcryption with insider security in the multi-user setting
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
A single key pair is adequate for the Zheng signcryption
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Efficient identity-based signcryption in the standard model
ProvSec'11 Proceedings of the 5th international conference on Provable security
Distributed signcryption schemes with formal proof of security
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Confidential signatures and deterministic signcryption
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Towards confidentiality of ID-Based signcryption schemes under without random oracle model
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Public key encryption for the forgetful
Cryptography and Security
On CCA-Secure somewhat homomorphic encryption
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
A biometric identity-based signcryption scheme
Future Generation Computer Systems
Generic constructions for verifiable signcryption
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Hi-index | 0.00 |
Signcryption is an asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a low computational and communication overhead. In this paper we propose realistic security models for signcryption, which give the attacker power to choose both messages/signcryptexts as well as recipient/sender public keys when accessing the signcryption/unsigncryption oracles of attacked entities. We then show that Zheng's original signcryption scheme is secure in our confidentiality model relative to the Gap Diffie-Hellman problem and is secure in our unforgeability model relative to a Gap version of the discrete logarithm problem. All these results are shown in the random oracle model.