2007
DOI: 10.1007/978-3-540-73408-6_6
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Signcryption Scheme with Key Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 22 publications
0
20
0
Order By: Relevance
“…However, with the exception of a few random oracle model schemes [29][30][31][32], most signcryption schemes define separate key generation algorithms for senders and receivers, or essentially define a public/private keypair to consist of the concatenation of separate sender and receiver keypairs. Hence, a user playing the role of both sender and receiver will have to generate the equivalent of two keypairs.…”
Section: Signcryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, with the exception of a few random oracle model schemes [29][30][31][32], most signcryption schemes define separate key generation algorithms for senders and receivers, or essentially define a public/private keypair to consist of the concatenation of separate sender and receiver keypairs. Hence, a user playing the role of both sender and receiver will have to generate the equivalent of two keypairs.…”
Section: Signcryptionmentioning
confidence: 99%
“…Examples of signcryption schemes making use of a single keypair are known [29][30][31][32], but these are all in the random oracle model.…”
Section: Further Related Workmentioning
confidence: 99%
“…We will review the signcryption syntax used in [14,15,24]. A signcryption scheme is formalized by five PPT algorithms SC = (Setup, KeyGen, SignCrypt, UnSignCrypt, Verify).…”
Section: Signcryption Syntaxmentioning
confidence: 99%
“…[14,15,24], which requires that the challenge signcryption ciphertext C was not previously output by the signcryption oracle SC.S sk U (·, ·) on input (m, pk R ). However, as pointed out in [1] and similar to the signature setting in [13], the conventional (i.e.…”
Section: Definitionmentioning
confidence: 99%
“…The privacy-protection requirement in VANETs can be satisfied by this property. The signcryption scheme in [28] is shown to satisfy message confidentiality, signature unforgeability, and ciphertext anonymity. In this paper, we employ this signcryption scheme to help a vehicle to safely receive secret member keys from RSUs.…”
Section: Signcryptionmentioning
confidence: 99%