ID-based efficient signcryption key encapsulation scheme

被引:0
|
作者
Lai, Xin [1 ,2 ]
Huang, Xiaofang [3 ]
He, Dake [1 ]
机构
[1] Information Security and National Computing Grid Laboratory (IS and NC), South West Jiaotong University, Chengdu 610031, China
[2] School of Air Traffic Management, Civil Aviation Flight University of China, Guanghan 618307, China
[3] Information Security Center, Beijing University of Post and Telecommunications, Beijing 100876, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:857 / 863
相关论文
共 50 条
  • [41] ID-based key-insulated signcryption with equality test in cloud computing
    Seth Alornyo
    Kingsford Kissi Mireku
    Mustapha Adamu Mohammed
    Daniel Adu-Gyamfi
    Michael Asante
    SN Applied Sciences, 2021, 3
  • [42] An Improved ID-Based Multi-Proxy Multi-Signcryption Scheme
    Zhou Xiaoyan
    Wu Yan
    Du Weifeng
    Gao Yan
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 466 - +
  • [44] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [45] ID-based key agreement and authentication scheme in WLAN
    Liu, Han
    Gu, Da-Wu
    Shi, Qing-Zu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2005, 39 (08): : 1327 - 1330
  • [46] On the security of provably secure multi-receiver ID-based signcryption scheme
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1836 - 1838
  • [47] Secure key issuing scheme in ID-based cryptography with revocable ID
    Tanwar, Sarvesh
    Kumar, Anil
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 676 - 685
  • [48] EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts
    Xu, Zhong
    Ma, Ruiping
    Liu, Shuai
    He, Wenbo
    AD HOC & SENSOR WIRELESS NETWORKS, 2011, 11 (1-2) : 93 - 110
  • [49] ID-based Signcryption KEM to Multiple Recipients
    Sun Yinxia
    Li Hui
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 317 - 322
  • [50] Efficient ID-based Key-insulated Multi Signature Scheme without Pairings
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,