Proceedings of the 3rd International Conference on Information Security 2004
DOI: 10.1145/1046290.1046298
|View full text |Cite
|
Sign up to set email alerts
|

Robust ID-based threshold signcryption scheme from pairings

Abstract: Recently bilinear pairings on elliptic curves have raised great interest in cryptographic comnmnity. BaKed oi, their good properties, many excellent ID-based cryptographic schemes have been proposed. However, in these proposed schemes, the private key generator should be assumed trusted, while in real environment, this assumption does not always hold. To overcome this weakness, in this paper, we will use the threshold technology to devise a secure ID-based signcryption scheme. Since tile threshold technology k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
25
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(25 citation statements)
references
References 18 publications
0
25
0
Order By: Relevance
“…[4,6,7,8,16,19]. In addition, many variations of ID-based signcryption were proposed, for examples, IDbased proxy signcryption [13,15,26], ID-based threshold signcryption [10,17,18,21] and unsigncryption [14], and ID-based blind signcryption [27].…”
Section: Introductionmentioning
confidence: 99%
“…[4,6,7,8,16,19]. In addition, many variations of ID-based signcryption were proposed, for examples, IDbased proxy signcryption [13,15,26], ID-based threshold signcryption [10,17,18,21] and unsigncryption [14], and ID-based blind signcryption [27].…”
Section: Introductionmentioning
confidence: 99%
“…In 2004, Duan et al [12] proposed an ID-based threshold signcryption scheme by combining the concepts of ID-based threshold signature and signcryption together. However, in Duan et al's scheme [12], the master-key of the PKG is distributed to a number of other PKGs, which creates a bottleneck on the PKGs.…”
Section: Introductionmentioning
confidence: 99%
“…However, in Duan et al's scheme [12], the master-key of the PKG is distributed to a number of other PKGs, which creates a bottleneck on the PKGs. In 2005, Peng and Li [26] proposed an ID-based threshold signcryption scheme based on Libert and Quisquater's ID-based signcryption scheme [19].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations