2018
DOI: 10.1155/2018/3578942
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Certificateless Generalized Signcryption Scheme

Abstract: Generalized signcryption can adaptively work as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm. The paper proposes an efficient certificateless generic signcryption scheme without utilizing bilinear pairing operations. It is proved to satisfy confidentiality and unforgeability against chosen ciphertext and message attacks in an adaptive manner, respectively, in the random oracle model. Due to the lower computational cost and communication overhead, the proposed schem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(35 citation statements)
references
References 24 publications
0
35
0
Order By: Relevance
“…Eight algorithms are considered for constructing the proposed scheme [55]. Each of them is explained as follows:…”
Section: Construction Of Certificateless Key-encapsulation Signcrymentioning
confidence: 99%
“…Eight algorithms are considered for constructing the proposed scheme [55]. Each of them is explained as follows:…”
Section: Construction Of Certificateless Key-encapsulation Signcrymentioning
confidence: 99%
“…The medical server and the attacker easily modified the sensitive data of the patient. In scheme [24], the author proposed an efficient and novel method based on CLC based generalized signcryption that satisfied the essential security property of data confidentiality and unforgeability against massage and chosenciphertext attacks, respectively, in ROM. In this scheme, the security is obtained without applying pairing operations due to which this scheme suitable for the low processor and low memory devices.…”
Section: Related Workmentioning
confidence: 99%
“…Two cases are considered here. A challenge-response game is initiated as mentioned in [33]. A challenger C generates the public parameters param and msk by executing the setup algorithm.…”
Section: ) Other Security Requirements A: Correctnessmentioning
confidence: 99%