Identity based proxy-signcryption scheme from pairings

被引:0
|
作者
Li, XX [1 ]
Chen, KF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. A signcryption is a primitive that provides private and authenticated delivery of messages between two parties. Proxy signature schemes are variations of ordinary digital signature schemes and have been shown to be useful in many applications. In this paper We proposed an identity based proxy-signcryption scheme from pairings. Also we analyze the proposed scheme from efficiency and security points of view. Heuristic arguments have been given for those security properties. We have shown that the proxy-signcryption scheme is as efficient as ordinary identity based signcryption schemes under certain circumstances.
引用
收藏
页码:494 / 497
页数:4
相关论文
共 50 条
  • [21] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [22] A Secure and Efficient Identity based Proxy Signcryption Scheme for Smart Grid Network
    Patil, Rachana
    Patil, Yogesh H.
    [J]. Journal of Engineering Science and Technology Review, 2022, 15 (04) : 82 - 89
  • [23] Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
    Wang, Q
    Cao, ZF
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 167 - 172
  • [24] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [25] Fast and proven secure blind identity-based signcryption from pairings
    Yuen, TH
    Wei, VK
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 305 - 322
  • [26] Identity-based proxy signcryption schemes
    Jian, Wu
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [27] Identity based Multi-Proxy Multi-Signcryption Scheme for Electronic Commerce
    Sun, Ying
    Xu, Chunxiang
    Li, Fagen
    Yu, Yong
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 281 - 284
  • [28] Certificateless Proxy Signcryption Scheme from Lattice
    Yu Huifang
    Wang Ning
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (07) : 2584 - 2591
  • [29] A new proxy identity-based signcryption scheme for partial delegation of signing rights
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    [J]. AEJ - Alexandria Engineering Journal, 2008, 47 (06): : 503 - 510
  • [30] A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
    Chang, Ya-Fen
    Tai, Wei-Liang
    Lin, Chung-Yi
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 60 - 68