ID-based efficient signcryption key encapsulation scheme

被引:0
|
作者
Lai, Xin [1 ,2 ]
Huang, Xiaofang [3 ]
He, Dake [1 ]
机构
[1] Information Security and National Computing Grid Laboratory (IS and NC), South West Jiaotong University, Chengdu 610031, China
[2] School of Air Traffic Management, Civil Aviation Flight University of China, Guanghan 618307, China
[3] Information Security Center, Beijing University of Post and Telecommunications, Beijing 100876, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:857 / 863
相关论文
共 50 条
  • [31] A SIMPLE ID-BASED SCHEME FOR KEY SHARING
    TSUJII, S
    CHAO, JH
    ARAKI, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 730 - 734
  • [32] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [33] A proposal of efficient scheme of key management using ID-based encryption and biometrics
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 29 - +
  • [34] An efficient ID-based bilinear key predistribution scheme for distributed sensor networks
    Dai, Tran Thanh
    Hieu, Cao Trong
    Hong, Choong Seon
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 260 - 269
  • [35] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [36] Efficient ID-based certificateless signature scheme
    Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China
    Tongxin Xuebao, 2008, 2 (87-94):
  • [37] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [38] An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model
    Zhang, Bo
    Xu, Qiuliang
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 15 - 27
  • [39] ID-based key-insulated signcryption with equality test in cloud computing
    Alornyo, Seth
    Mireku, Kingsford Kissi
    Mohammed, Mustapha Adamu
    Adu-Gyamfi, Daniel
    Asante, Michael
    SN APPLIED SCIENCES, 2021, 3 (04):
  • [40] A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications
    Li, Fagen
    Xiong, Hu
    Nie, Xuyun
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 296 - 300