2016
DOI: 10.4218/etrij.16.0115.0983
|View full text |Cite
|
Sign up to set email alerts
|

Certificate-Based Signcryption Scheme without Pairing: Directly Verifying Signcrypted Messages Using a Public Key

Abstract: To achieve confidentiality, integrity, authentication, and non-repudiation simultaneously, the concept of signcryption was introduced by combining encryption and a signature in a single scheme. Certificate-based encryption schemes are designed to resolve the key escrow problem of identity-based encryption, as well as to simplify the certificate management problem in traditional public key cryptosystems. In this paper, we propose a new certificate-based signcryption scheme that has been proved to be secure agai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 35 publications
(47 reference statements)
0
12
0
Order By: Relevance
“…For the secure communication phase, the scheme of [5] is used, which has been shown to outperform the existing literature [28,29]. With respect to the key agreement scheme, which is based on the existence of PUFs, we utilize a straightforward public key variant as benchmark.…”
Section: Performancementioning
confidence: 99%
“…For the secure communication phase, the scheme of [5] is used, which has been shown to outperform the existing literature [28,29]. With respect to the key agreement scheme, which is based on the existence of PUFs, we utilize a straightforward public key variant as benchmark.…”
Section: Performancementioning
confidence: 99%
“…However, very recently two paring free certificate based systems have been made proposed [5,6]. A performance comparison in [5] was given to compare the schemes between [5,6,13,14], showing that [5] was outperforming the others. The schemes [13,14] are making use of pairing operations.…”
Section: Related Workmentioning
confidence: 99%
“…In literature, there have been recently two different certificate based pairing free systems described, which are proven to be secure in the random oracle model against chosen-ciphertext attacks and existentially unforgeable against chosen-message attacks. The system in [5] is based on the discrete logarithm problem (DL) and the other system in [6] on the elliptic curve discrete logarithm problem (ECDLP). In this paper, the scheme of [5] will be explicitly translated in elliptic curve (EC) terminology, and thus compared with [6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations