Identity based proxy-signcryption scheme from pairings

被引:0
|
作者
Li, XX [1 ]
Chen, KF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. A signcryption is a primitive that provides private and authenticated delivery of messages between two parties. Proxy signature schemes are variations of ordinary digital signature schemes and have been shown to be useful in many applications. In this paper We proposed an identity based proxy-signcryption scheme from pairings. Also we analyze the proposed scheme from efficiency and security points of view. Heuristic arguments have been given for those security properties. We have shown that the proxy-signcryption scheme is as efficient as ordinary identity based signcryption schemes under certain circumstances.
引用
收藏
页码:494 / 497
页数:4
相关论文
共 50 条
  • [1] An identity based proxy signcryption scheme without pairings
    Guo, Hui
    Deng, Lunzhi
    [J]. International Journal of Network Security, 2020, 22 (04) : 561 - 568
  • [2] A post-quantum communication secure identity-based proxy-signcryption scheme
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Wen, Junwei
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) : 147 - 165
  • [3] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [4] A new identity based signcryption scheme from pairings
    Libert, B
    Quisquater, JJ
    [J]. 2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, 2003, : 155 - 158
  • [5] Parallel Proxy-Signcryption Scheme in Cloud Environment
    Deng Wenping
    Wu Xuguang
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 402 - 406
  • [6] The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment
    Kim, KS
    Kim, JB
    Yang, HK
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 26 - 30
  • [7] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    [J]. Int. J. Secur. Netw., 2008, 3 (206-215):
  • [8] Efficient identity based proxy-signcryption schemes with forward security and public verifiability
    Wang, M
    Li, H
    Liu, ZJ
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 982 - 991
  • [9] An identity-based signcryption scheme with short ciphertext from pairings
    Chen, Huiyan
    Lu, Shuwang
    Liu, Zhenhua
    Chen, Qing
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 342 - 351
  • [10] Identity Based Generalized Proxy Signcryption Scheme
    Zhou, Cai-Xue
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 13 - 26