2014
DOI: 10.1007/s11704-014-3163-1
|View full text |Cite
|
Sign up to set email alerts
|

A lattice-based signcryption scheme without random oracles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…In 2019, Yan et al [12] constructed an attribute-based signcryption scheme from a lattice in the standard model. Lu et al [13] in 2014 constructed a lattice-based signcryption scheme in the standard model. In [13], Lu et al used Boyen's SUF-ACMA secure signature [14] and broke the malleability of ciphertext by adopting the bimode encryption method.…”
Section: A Related Work and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2019, Yan et al [12] constructed an attribute-based signcryption scheme from a lattice in the standard model. Lu et al [13] in 2014 constructed a lattice-based signcryption scheme in the standard model. In [13], Lu et al used Boyen's SUF-ACMA secure signature [14] and broke the malleability of ciphertext by adopting the bimode encryption method.…”
Section: A Related Work and Discussionmentioning
confidence: 99%
“…Lu et al [13] in 2014 constructed a lattice-based signcryption scheme in the standard model. In [13], Lu et al used Boyen's SUF-ACMA secure signature [14] and broke the malleability of ciphertext by adopting the bimode encryption method. Xiang et al [15] designed an attribute-based signcryption scheme from a lattice in the ROM.…”
Section: A Related Work and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding lattice-based signcryption constructions, there have been some works such as [13], [14], [15], [16] and [17]. Li et al [13] built a lattice-based signcryption scheme that are only secure in the random oracle model (ROM).…”
Section: Introductionmentioning
confidence: 99%
“…The theory of ordered sets plays an important role in many mathematical fields, as algebra, analysis, graph theory, combinatorics (see for instance [10], [1], [28]), [23]), etc. It is applied in different areas as computer science, coding theory, cryptography, (see for instance [13], [6], [22]), etc., as well as being by itself a remarkable area of interest for researchers.…”
Section: Introductionmentioning
confidence: 99%