2013
DOI: 10.1016/j.mcm.2012.06.011
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless hybrid signcryption

Abstract: a b s t r a c tSigncryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question of whether it is possible to construct a hybrid signcryption scheme in the certificateless setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 31 publications
(43 reference statements)
0
15
0
Order By: Relevance
“…However, the IBC has a weakness called key escrow problem since the PKG holds all the users' private keys. To overcome this problem, some CLSC schemes were proposed [14][15][16]. The CLC uses a trusted third party called the key generating center (KGC) who takes charge of generating a partial private key for each user using a master secret key.…”
Section: Related Workmentioning
confidence: 99%
“…However, the IBC has a weakness called key escrow problem since the PKG holds all the users' private keys. To overcome this problem, some CLSC schemes were proposed [14][15][16]. The CLC uses a trusted third party called the key generating center (KGC) who takes charge of generating a partial private key for each user using a master secret key.…”
Section: Related Workmentioning
confidence: 99%
“…Our choice of this technique was as a result of the above stated problem inherent in both PKI and IBC [8]based schemes and also the efficient introduced by [3] we also require that the computational cost of sensor nodes and the internet is low. Recently, a number of efficient CLSC schemes [9,10] have been proposed in Certificateless cryptography including those done in a standard model [11].…”
Section: Related Workmentioning
confidence: 99%
“…After each key generation stage the produced encryption key is temporary and exists only locally, and the reproduction of the key once again takes place from measurable characteristics of the integrated circuit [14]. ICmetrics generates encryption key from measurable properties of a given hardware device, similar to the way biometrics extracts human features.…”
Section: Digital Signaturementioning
confidence: 99%
“…For this reason signcryption is well suitable for resource constrained devices that require security with little resources [14][15]. Fig.…”
Section: Signcryptionmentioning
confidence: 99%