File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Signcryption in Hierarchical Identity Based Cryptosystem

TitleSigncryption in Hierarchical Identity Based Cryptosystem
Authors
Keywordsbilinear pairings
signcryption
hierarchical identity-based cryptosystem
Issue Date2005
PublisherSpringer .
Citation
IFIP TC11 20th International Information Security Conference (IFIP/SEC2005), Chiba, Japan, 30 May-1 June 2005. In IFIP Advances in Information and Communication Technology, 2005, v. 181, p. 443-457 How to Cite?
AbstractIn many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to "sign-then-encrypt" the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in [16]. The first one is to devise an efficient forward-secure signcryption scheme with public verifiability and public ciphertext authenticity, which is promptly closed by [10]. Another one which still remains open is to devise a hierarchical ID-based signcryption scheme that allows the user to receive signcrypted messages from sender who is under another sub-tree of the hierarchy. This paper aims at solving this problem by proposing two concrete constructions of hierarchical ID-based signcryption. Copyright © 2005 by International Federation for Information Processing.
Persistent Identifierhttp://hdl.handle.net/10722/93046
ISBN
ISSN
2015 SCImago Journal Rankings: 0.160

 

DC FieldValueLanguage
dc.contributor.authorChow, SMen_HK
dc.contributor.authorYuen, THen_HK
dc.contributor.authorHui, CKen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2010-09-25T14:49:15Z-
dc.date.available2010-09-25T14:49:15Z-
dc.date.issued2005en_HK
dc.identifier.citationIFIP TC11 20th International Information Security Conference (IFIP/SEC2005), Chiba, Japan, 30 May-1 June 2005. In IFIP Advances in Information and Communication Technology, 2005, v. 181, p. 443-457en_HK
dc.identifier.isbn978-038725658-0-
dc.identifier.issn1868-4238-
dc.identifier.urihttp://hdl.handle.net/10722/93046-
dc.description.abstractIn many situations we want to enjoy confidentiality, authenticity and non-repudiation of message simultaneously. One approach to achieve this objective is to "sign-then-encrypt" the message, or we can employ special cryptographic scheme like signcryption. Two open problems about identity-based (ID-based) signcryption were proposed in [16]. The first one is to devise an efficient forward-secure signcryption scheme with public verifiability and public ciphertext authenticity, which is promptly closed by [10]. Another one which still remains open is to devise a hierarchical ID-based signcryption scheme that allows the user to receive signcrypted messages from sender who is under another sub-tree of the hierarchy. This paper aims at solving this problem by proposing two concrete constructions of hierarchical ID-based signcryption. Copyright © 2005 by International Federation for Information Processing.-
dc.languageengen_HK
dc.publisherSpringer .en_HK
dc.relation.ispartofIFIP Advances in Information and Communication Technologyen_HK
dc.subjectbilinear pairings-
dc.subjectsigncryption-
dc.subjecthierarchical identity-based cryptosystem-
dc.titleSigncryption in Hierarchical Identity Based Cryptosystemen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailChow, SM: schow@cs.ngu.eduen_HK
dc.identifier.emailHui, CK: hui@cs.hku.hken_HK
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_HK
dc.identifier.authorityHui, CK=rp00120en_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.identifier.doi10.1007/0-387-25660-1_29-
dc.identifier.scopuseid_2-s2.0-84867515151-
dc.identifier.hkuros103676en_HK
dc.identifier.spage443en_HK
dc.identifier.epage457en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats