Signcryption with Non-interactive Non-repudiation

被引:0
|
作者
John Malone-Lee
机构
[1] University of Bristol,Department of Computer Science
来源
Designs, Codes and Cryptography | 2005年 / 37卷
关键词
Signcryption; non-repudiation; provable security;
D O I
暂无
中图分类号
学科分类号
摘要
Signcryption [33] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a composition of public key encryption and public key signature.
引用
收藏
页码:81 / 109
页数:28
相关论文
共 50 条
  • [1] Signcryption with non-interactive non-repudiation
    Malone-Lee, J
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 81 - 109
  • [2] Generic Constructions for Signcryption with Non-interactive Non-repudiation
    Fan, Jia
    Zhang, Lijun
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 15 - 18
  • [3] Signcryption with non-interactive non-repudiation without random oracles
    Fan J.
    Zheng Y.
    Tang X.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1): : 202 - 230
  • [4] An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation
    Togde, Ngarenon
    Sarr, Augustin P.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2023, 2024, 14412 : 117 - 138
  • [5] A Computational Diffie-Hellman-Based Insider Secure Signcryption with Non-interactive Non-repudiation
    Togde, Ngarenon
    Sarr, Augustin P.
    MATHEMATICS AND COMPUTING, ICMC 2022, 2022, 415 : 89 - 101
  • [6] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [7] A proof of non-repudiation
    Bella, G
    Paulson, LC
    SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [8] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    J Network Comput Appl, 3 (267-281):
  • [9] Observations on non-repudiation
    Lect Notes Comput Sci, (133):
  • [10] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132