File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
Title | Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity |
---|---|
Authors | |
Keywords | Cryptographic primitives Elliptic curve cryptosystems Firewalls Forward security Identity-based signcryption Network security Provable security Public ciphertext authenticity Public key cryptosystems Public verifiability Semantical security |
Issue Date | 2004 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2004, v. 2971, p. 352-369 How to Cite? |
Abstract | Boyen [7] gave the first identity-based (ID-based) signcryption scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryption scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes. © Springer-Verlag; 2004. |
Persistent Identifier | http://hdl.handle.net/10722/93236 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, SSM | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Chow, KP | en_HK |
dc.date.accessioned | 2010-09-25T14:55:00Z | - |
dc.date.available | 2010-09-25T14:55:00Z | - |
dc.date.issued | 2004 | en_HK |
dc.identifier.citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2004, v. 2971, p. 352-369 | en_HK |
dc.identifier.issn | 0302-9743 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/93236 | - |
dc.description.abstract | Boyen [7] gave the first identity-based (ID-based) signcryption scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. This requirement is referred as public ciphertext authenticity. In this paper, we give another ID-based signcryption scheme that can provide public ciphertext authenticity and is forward and provably secure as well as publicly verifiable. Our scheme is modified from Libert and Quisquater's ID-based signcryption scheme [16] and the efficiency of our scheme is comparable to other previous ID-based signcryption schemes. © Springer-Verlag; 2004. | en_HK |
dc.language | eng | en_HK |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_HK |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_HK |
dc.subject | Cryptographic primitives | en_HK |
dc.subject | Elliptic curve cryptosystems | en_HK |
dc.subject | Firewalls | en_HK |
dc.subject | Forward security | en_HK |
dc.subject | Identity-based signcryption | en_HK |
dc.subject | Network security | en_HK |
dc.subject | Provable security | en_HK |
dc.subject | Public ciphertext authenticity | en_HK |
dc.subject | Public key cryptosystems | en_HK |
dc.subject | Public verifiability | en_HK |
dc.subject | Semantical security | en_HK |
dc.title | Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity | en_HK |
dc.type | Article | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Chow, KP:chow@cs.hku.hk | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Chow, KP=rp00111 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-35048854673 | en_HK |
dc.identifier.hkuros | 92287 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-35048854673&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 2971 | en_HK |
dc.identifier.spage | 352 | en_HK |
dc.identifier.epage | 369 | en_HK |
dc.publisher.place | Germany | en_HK |
dc.identifier.scopusauthorid | Chow, SSM=8980575500 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_HK |
dc.identifier.issnl | 0302-9743 | - |