2017
DOI: 10.1515/jmc-2015-0014
|View full text |Cite
|
Sign up to set email alerts
|

A secure anonymous proxy signcryption scheme

Abstract: We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender in case of misuse. We introduce a formal definition of an identity-based anonymous proxy signcryption (IBAPS) scheme and give a security model for it. We also construct an IBAPS scheme and prove its security under the discrete logarithm assumption and computational Diffie–Hellman ass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…A proxy signcryption [6][7][8] is a cryptographic algorithm that merges the idea of signcryption and algorithm with a proxy signature. In cryptography, signcryption is a cryptographic algorithm that achieves the functionality of both confidentiality and authentication in a single reasonable step with better performance than a traditional approach.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…A proxy signcryption [6][7][8] is a cryptographic algorithm that merges the idea of signcryption and algorithm with a proxy signature. In cryptography, signcryption is a cryptographic algorithm that achieves the functionality of both confidentiality and authentication in a single reasonable step with better performance than a traditional approach.…”
Section: Related Workmentioning
confidence: 99%
“…In cryptography, signcryption is a cryptographic algorithm that achieves the functionality of both confidentiality and authentication in a single reasonable step with better performance than a traditional approach. The first signcryption scheme was proposed by Y. Zheng [1] later, several signcryption schemes have been proposed [2][3][4][5][6][7][8]. Proxy signature model, allows an entity officially delegate his/her signing right to someone so that he/she can sign a message on his/her behalf.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In general, the CLPSC scheme comprises three different entities: an original signcrypter (OS), a receiver (R), and a proxy signcrypter (PS). An OS (e.g., a patient) delegates to PS (e.g., a trusted individual such as a family member or neighbor) the authority to signcrypt a message [17,18]. During proxy signcryption, OS sends his/her signing authority to PS with a delegation warrant, which consists of the identities of the delegator, a message space, and the validity time of the delegation.…”
Section: Syntax Definition Of Clpsc Schemementioning
confidence: 99%