IBASC: Identity based aggregate signcryption scheme with public verifiability

被引:0
|
作者
Han, Yiliang [1 ]
Lu, Wanyi [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Department of Electronic Technology, Key Laboratory on Networks and Information Security of CAPF, Engineering University of CAPF, Sanqiao, Xi'an 710086, China
来源
ICIC Express Letters | 2013年 / 7卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:2075 / 2080
相关论文
共 50 条
  • [41] Identity Based Generalized Signcryption Scheme in the Standard Model
    Shen, Xiaoqin
    Ming, Yang
    Feng, Jie
    ENTROPY, 2017, 19 (03)
  • [42] An improved identity-based KCDSA signcryption scheme
    Li, Fagen
    Xu, Chunxiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 230 - +
  • [43] Provable secure identity based generalized signcryption scheme
    Yu, Gang
    Ma, Xiaoxiao
    Shen, Yong
    Han, Wenbao
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (40-42) : 3614 - 3624
  • [44] A new identity-based ring signcryption scheme
    Deng, Lunzhi, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06):
  • [45] An Improved Identity-Based Ring Signcryption Scheme
    Deng, Lunzhi
    Liu, Chenglian
    Wang, Xiangbin
    INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 46 - 54
  • [46] An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System
    Yang, Yi
    He, Debiao
    Vijayakumar, Pandi
    Gupta, Brij B.
    Xie, Qi
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (03): : 1520 - 1531
  • [47] Correction to: A Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve
    Malik Zia Ullah Bashir
    Rashid Ali
    Wireless Personal Communications, 2021, 120 : 1921 - 1921
  • [48] Efficient identity based signature/signcryption scheme in the standard model
    Ren Yanli
    Gu Dawu
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 133 - +
  • [49] An identity-based threshold signcryption scheme with semantic security
    Peng, CG
    Li, X
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 173 - 179
  • [50] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 547 - 553