File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity

TitleEfficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
Authors
KeywordsCryptographic primitives
Elliptic curve cryptosystems
Firewalls
Forward security
Identity-based signcryption
Network security
Provable security
Public ciphertext authenticity
Public key cryptosystems
Public verifiability
Semantical security
Issue Date2004
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2004, v. 2971, p. 352-369 How to Cite?
AbstractBoyen [7] gave the first identity-based (ID-based) signcryption scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryption scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes. © Springer-Verlag; 2004.
Persistent Identifierhttp://hdl.handle.net/10722/93236
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252
References

 

DC FieldValueLanguage
dc.contributor.authorChow, SSMen_HK
dc.contributor.authorYiu, SMen_HK
dc.contributor.authorHui, LCKen_HK
dc.contributor.authorChow, KPen_HK
dc.date.accessioned2010-09-25T14:55:00Z-
dc.date.available2010-09-25T14:55:00Z-
dc.date.issued2004en_HK
dc.identifier.citationLecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2004, v. 2971, p. 352-369en_HK
dc.identifier.issn0302-9743en_HK
dc.identifier.urihttp://hdl.handle.net/10722/93236-
dc.description.abstractBoyen [7] gave the first identity-based (ID-based) signcryption scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryption scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes. © Springer-Verlag; 2004.en_HK
dc.languageengen_HK
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_HK
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_HK
dc.subjectCryptographic primitivesen_HK
dc.subjectElliptic curve cryptosystemsen_HK
dc.subjectFirewallsen_HK
dc.subjectForward securityen_HK
dc.subjectIdentity-based signcryptionen_HK
dc.subjectNetwork securityen_HK
dc.subjectProvable securityen_HK
dc.subjectPublic ciphertext authenticityen_HK
dc.subjectPublic key cryptosystemsen_HK
dc.subjectPublic verifiabilityen_HK
dc.subjectSemantical securityen_HK
dc.titleEfficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticityen_HK
dc.typeArticleen_HK
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_HK
dc.identifier.emailHui, LCK:hui@cs.hku.hken_HK
dc.identifier.emailChow, KP:chow@cs.hku.hken_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.identifier.authorityHui, LCK=rp00120en_HK
dc.identifier.authorityChow, KP=rp00111en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-35048854673en_HK
dc.identifier.hkuros92287en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-35048854673&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume2971en_HK
dc.identifier.spage352en_HK
dc.identifier.epage369en_HK
dc.publisher.placeGermanyen_HK
dc.identifier.scopusauthoridChow, SSM=8980575500en_HK
dc.identifier.scopusauthoridYiu, SM=7003282240en_HK
dc.identifier.scopusauthoridHui, LCK=8905728300en_HK
dc.identifier.scopusauthoridChow, KP=7202180751en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats