Cryptanalysis of an identity based signcryption scheme in the standard model

被引:0
|
作者
Ming, Yang [1 ]
Wang, Yumin [2 ]
机构
[1] School of Information Engineering, Chang'an University, Xi'an, Shaanxi,710064, China
[2] State Key Laboratory of ISN, Xidian University, Xi'an, Shaanxi,710071, China
关键词
31;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:165 / 171
相关论文
共 50 条
  • [21] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    Jain, Neha
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
  • [22] Proxy signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1431 - 1446
  • [23] Certificateless signcryption scheme in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Ma, Hua
    INFORMATION SCIENCES, 2010, 180 (03) : 452 - 464
  • [24] Cryptanalysis of a Certificateless Ring Signcryption Scheme
    Du, Hongzhen
    Wen, Qiaoyan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 329 - 336
  • [25] Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    Wang, Hui
    JOURNAL OF COMPUTERS, 2012, 7 (06) : 1345 - 1352
  • [26] Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls
    Zia, Malik
    Ali, Rashid
    PLOS ONE, 2018, 13 (12):
  • [27] Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve
    Zia, M.
    Ali, R.
    ELECTRONICS LETTERS, 2019, 55 (08) : 457 - 459
  • [28] A new efficient signcryption scheme in the standard model
    Yang, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 778 - 789
  • [29] An ID-based signcryption scheme for multiple receivers in standard model
    Qi Z.
    Yang G.
    Ren X.
    Wang H.
    Jiangsu Daxue Xuebao (Ziran Kexue Ban)/Journal of Jiangsu University (Natural Science Edition), 2011, 32 (05): : 573 - 577
  • [30] An efficient identity based generalized signcryption scheme
    Kushwah, Prashant
    Lal, Sunder
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (45) : 6382 - 6389