Secure and efficient identity-based threshold signcryption scheme

被引:0
|
作者
Sun, Hua [1 ]
Zheng, Xue-Feng [1 ]
Yu, Yi-Ke [1 ]
Zhou, Fang [1 ]
机构
[1] School of Information Engineering, University of Science and Technology Beijing, Beijing 100083, China
来源
Kongzhi yu Juece/Control and Decision | 2010年 / 25卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1031 / 1034
相关论文
共 50 条
  • [41] Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
    Karati, Arijit
    Islam, S. K. Hafizul
    Biswas, G. P.
    Bhuiyan, Md Zakirul Alam
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2904 - 2914
  • [42] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [43] An Efficient Identity-based Signcryption from Lattice
    Zhao, Xiufeng
    Wang, Xiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 363 - 374
  • [44] Efficient Identity-Based Signcryption in the Standard Model
    Li, Fagen
    Bin Muhaya, Fahad
    Zhang, Mingwu
    Takagi, Tsuyoshi
    PROVABLE SECURITY, 2011, 6980 : 120 - +
  • [45] Identity-based threshold ring signcryption from pairing
    Deng, Lunzhi
    Li, Siwei
    Yu, Yafeng
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (02) : 90 - 103
  • [46] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    Jain, Neha
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
  • [47] Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    Barreto, PSLM
    Libert, B
    McCullagh, N
    Quisquater, JJ
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 515 - 532
  • [48] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [49] A novel identity-based multi-signcryption scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 547 - 553
  • [50] Analysis of an Identity-Based Signcryption Scheme in the Standard Model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 268 - 269