Cryptanalysis of an identity based signcryption scheme in the standard model

被引:0
|
作者
Ming, Yang [1 ]
Wang, Yumin [2 ]
机构
[1] School of Information Engineering, Chang'an University, Xi'an, Shaanxi,710064, China
[2] State Key Laboratory of ISN, Xidian University, Xi'an, Shaanxi,710071, China
关键词
31;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:165 / 171
相关论文
共 50 条
  • [31] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310
  • [32] An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model
    Zhang, Bo
    SECURITY TECHNOLOGY, 2011, 259 : 123 - 127
  • [33] Identity Based Generalized Proxy Signcryption Scheme
    Zhou, Cai-Xue
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 13 - 26
  • [34] Identity Based Public Verifiable Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    PROVABLE SECURITY, 2010, 6402 : 244 - 260
  • [35] Cryptanalysis and improvement of a signcryption scheme with public verifiability
    State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
    不详
    Tien Tzu Hsueh Pao, 2006, 1 (177-179):
  • [36] Identity based threshold proxy signcryption scheme
    Wang, M
    Liu, ZJ
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 695 - 699
  • [37] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489
  • [38] Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve
    Toorani, Mohsen
    Shirazi, Ali Asghar Beheshti
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 428 - 432
  • [39] Identity-based aggregate signcryption in the standard model from multilinear maps
    Wang, Hao
    Liu, Zhen
    Liu, Zhe
    Wong, Duncan S.
    FRONTIERS OF COMPUTER SCIENCE, 2016, 10 (04) : 741 - 754
  • [40] A provably secure, shortest, and efficient identity based signcryption technique in the standard model
    Aithekar, Ashutosh
    Gupta, Pratik
    Dharminder, Dharminder
    SECURITY AND PRIVACY, 2023, 6 (01)