2010
DOI: 10.1007/978-3-642-16280-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Identity Based Public Verifiable Signcryption Scheme

Abstract: Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after unsigncrypting the ciphertext. Thus, a third party will not be able to verify whether the ciphertext is valid or not. Signcryption schemes that allow any user to verify the validity of the ciphertext without the knowledge of the message are called public verifiable sig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…In 2002, Malone-Lee [4] merged identity-based cryptography with signcryption and designed a new ID based signcryption (IBSC) scheme. This IBSC scheme [4] provides foundation for some other identity based signcryption and its variant [5][6][7][8][9][10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…In 2002, Malone-Lee [4] merged identity-based cryptography with signcryption and designed a new ID based signcryption (IBSC) scheme. This IBSC scheme [4] provides foundation for some other identity based signcryption and its variant [5][6][7][8][9][10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…The first identity based signcryption scheme was proposed by Malone Lee [8] in 2002, and they also gave the security model for signcryption in identity based settings. Since then, many identity based signcryption schemes have been proposed [9][10][11][12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…This property is also needed in filtering out spams in a secure email system. Although a number of constructions [3,46,17,38,45] have tackled the notion of verifiability (this notion is often referred to in the literature as public verifiability, and it denotes the possibility to release (by the receiver) some information which allows to publicly verify a signcryption with/out revealing the message in question), most of these schemes do not allow the sender to prove the validity of the created signcryption, nor allow the receiver to prove without revealing any information, ensuring consequently non-transferability, to a third party, the validity of a signcryption w.r.t. a given message.…”
Section: Introductionmentioning
confidence: 99%