2010 Second International Conference on Knowledge and Systems Engineering 2010
DOI: 10.1109/kse.2010.17
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Identity-Based Broadcast Signcryption Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…This scheme is considered useful with devices that have limited resources because the characteristics of confidentiality, authentication, integrity, and non-repudiation can be produced concurrently by the minimam cost [14]. The major feature of the signcryption is that the signature and encryption have been combined at the single logical step [15], [16], [17], which reduces the computational cost. However, all of the above-mentioned schemes are not suitable for the IoV scenario, because the limitation resource in the sensors embedded in the vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…This scheme is considered useful with devices that have limited resources because the characteristics of confidentiality, authentication, integrity, and non-repudiation can be produced concurrently by the minimam cost [14]. The major feature of the signcryption is that the signature and encryption have been combined at the single logical step [15], [16], [17], which reduces the computational cost. However, all of the above-mentioned schemes are not suitable for the IoV scenario, because the limitation resource in the sensors embedded in the vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…For the scheme [11], every subscriber obtains the same session key from the broadcaster, if one of the subscribers wants to unregister from the broadcaster, the broadcaster needs to re-change and redistribute the session key for the other subscribers. Recently, [14] and [15] proposed an efficient identitybased broadcast signcryption scheme respectively, their schemes have constant size ciphertext for the broadcaster, but the broadcaster needs to transmit the identity information of designated receivers, and the public key generated and delivered by the PKG is of size linear in the maximal value of the set of receivers, for the receiver IDi the cost of multiplication and exponentiation operations depends on number of receivers, that computation overheads is too high for a user, thus their schemes do not apply to the end user with limited computing capability. Moreover, the schemes all above do not satisfy the register secrecy and forward secrecy security attributes.…”
Section: Introductionmentioning
confidence: 99%