File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/0-387-25660-1_29
- Scopus: eid_2-s2.0-84867515151
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Signcryption in Hierarchical Identity Based Cryptosystem
Title | Signcryption in Hierarchical Identity Based Cryptosystem |
---|---|
Authors | |
Keywords | bilinear pairings signcryption hierarchical identity-based cryptosystem |
Issue Date | 2005 |
Publisher | Springer . |
Citation | IFIP TC11 20th International Information Security Conference (IFIP/SEC2005), Chiba, Japan, 30 May-1 June 2005. In IFIP Advances in Information and Communication Technology, 2005, v. 181, p. 443-457 How to Cite? |
Abstract | In many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to "sign-then-encrypt" the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in [16]. The first one is to devise an efficient forward-secure signcryption scheme with public verifiability and public ciphertext authenticity, which is promptly closed by [10]. Another one which still remains open is to devise a hierarchical ID-based signcryption scheme that allows the user to receive signcrypted messages from sender who is under another sub-tree of the hierarchy. This paper aims at solving this problem by proposing two concrete constructions of hierarchical ID-based signcryption. Copyright © 2005 by International Federation for Information Processing. |
Persistent Identifier | http://hdl.handle.net/10722/93046 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.242 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, SM | en_HK |
dc.contributor.author | Yuen, TH | en_HK |
dc.contributor.author | Hui, CK | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2010-09-25T14:49:15Z | - |
dc.date.available | 2010-09-25T14:49:15Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | IFIP TC11 20th International Information Security Conference (IFIP/SEC2005), Chiba, Japan, 30 May-1 June 2005. In IFIP Advances in Information and Communication Technology, 2005, v. 181, p. 443-457 | en_HK |
dc.identifier.isbn | 978-038725658-0 | - |
dc.identifier.issn | 1868-4238 | - |
dc.identifier.uri | http://hdl.handle.net/10722/93046 | - |
dc.description.abstract | In many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to "sign-then-encrypt" the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in [16]. The first one is to devise an efficient forward-secure signcryption scheme with public verifiability and public ciphertext authenticity, which is promptly closed by [10]. Another one which still remains open is to devise a hierarchical ID-based signcryption scheme that allows the user to receive signcrypted messages from sender who is under another sub-tree of the hierarchy. This paper aims at solving this problem by proposing two concrete constructions of hierarchical ID-based signcryption. Copyright © 2005 by International Federation for Information Processing. | - |
dc.language | eng | en_HK |
dc.publisher | Springer . | en_HK |
dc.relation.ispartof | IFIP Advances in Information and Communication Technology | en_HK |
dc.subject | bilinear pairings | - |
dc.subject | signcryption | - |
dc.subject | hierarchical identity-based cryptosystem | - |
dc.title | Signcryption in Hierarchical Identity Based Cryptosystem | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Chow, SM: schow@cs.ngu.edu | en_HK |
dc.identifier.email | Hui, CK: hui@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Hui, CK=rp00120 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.identifier.doi | 10.1007/0-387-25660-1_29 | - |
dc.identifier.scopus | eid_2-s2.0-84867515151 | - |
dc.identifier.hkuros | 103676 | en_HK |
dc.identifier.spage | 443 | en_HK |
dc.identifier.epage | 457 | en_HK |
dc.identifier.issnl | 1868-4238 | - |