2011
DOI: 10.4103/0256-4602.81236
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Identity-based Signcryption

Abstract: Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-thenencryption approach. Signcryption has found many applications, such as electronic transaction protocol, mobile agent protocol, key management, and routing protocol. In this article, the state-of-the-art of identitybased signcryption (IBSC) is surveyed. We examine the security model of IBSC. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 44 publications
0
12
0
Order By: Relevance
“…The idea of this kind of primitive is to carry out encryption and signature in a single logical step, to obtain confi dentiality and authentication more eff iciently than the traditional signature-then-encryption approach. Due to the advantages, less computational complexity and lower communication cost, signcryption is suitable for many practical applications which require secure and authenticated message delivery using resource constrained devices [8,12]. The original scheme in [16] is based on the discrete logarithm problem but no security proof is given.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea of this kind of primitive is to carry out encryption and signature in a single logical step, to obtain confi dentiality and authentication more eff iciently than the traditional signature-then-encryption approach. Due to the advantages, less computational complexity and lower communication cost, signcryption is suitable for many practical applications which require secure and authenticated message delivery using resource constrained devices [8,12]. The original scheme in [16] is based on the discrete logarithm problem but no security proof is given.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, other identity based signcryption schemes using pairing were proposed in the literature [2,4,5,7,9,14]. With these identity based signature schemes and signcryption schemes a lot of new extensions such as proxy signcryption, blind signcryption, ring signcryption, multi-signcryption etc., have been proposed in the literature [8].…”
Section: Introductionmentioning
confidence: 99%
“…There are some signcryption schemes [912] have been proposed to advance the signcryption research. For the multi-receiver cryptography, multi-receiver signcryption gradually becomes the research focus.…”
Section: Introductionmentioning
confidence: 99%
“…In 1997, Zhang [2] proposed a cryptographic primitive, called signcryption, to achieve the combined functionalities of digital signatures and encryption in an efficient manner. Many researchers have proposed a variety of signcryption schemes [3]. One of these variants is a proxy signcryption scheme which efficiently combines a proxy signature scheme with an encryption mechanism.…”
Section: Introductionmentioning
confidence: 99%