Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security 2008
DOI: 10.1145/1368310.1368364
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless signcryption

Abstract: Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and digital signatures, offering better overall performance and security. In this paper, we introduce the notion of certificateless signcryption and present an effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
89
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 167 publications
(89 citation statements)
references
References 16 publications
0
89
0
Order By: Relevance
“…Their scheme heavily relies on bilinear pairing solution for signcryption, which is a very good method for an online/offline scheme since it achieves signature and encryption in a single logical step. Identitybased signcryption was introduced by Molene-Lee [4].In 2008, Barbosa and Farshim first introduced the certificateless signcryption (CLSC) and proposed a CLSC scheme [3], which requires six pairing operations in the signcryption and unsigncryption phase. Recently, a proved security certificateless signcryption scheme in the standard model was proposed by Liu et al [7] which requires five pairing operations and one exponentiation in signcrypt and designcrypt phase.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Their scheme heavily relies on bilinear pairing solution for signcryption, which is a very good method for an online/offline scheme since it achieves signature and encryption in a single logical step. Identitybased signcryption was introduced by Molene-Lee [4].In 2008, Barbosa and Farshim first introduced the certificateless signcryption (CLSC) and proposed a CLSC scheme [3], which requires six pairing operations in the signcryption and unsigncryption phase. Recently, a proved security certificateless signcryption scheme in the standard model was proposed by Liu et al [7] which requires five pairing operations and one exponentiation in signcrypt and designcrypt phase.…”
Section: Related Workmentioning
confidence: 99%
“…LI et al [5] produce a scheme based on Barbosa and Farshim. Our choice of this technique was as a result of the above stated problem inherent in both PKI and IBC [8]based schemes and also the efficient introduced by [3] we also require that the computational cost of sensor nodes and the internet is low. Recently, a number of efficient CLSC schemes [9,10] have been proposed in Certificateless cryptography including those done in a standard model [11].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we give the review and attack of the certificateless signcryption scheme by Barbosa et al [4].…”
Section: Certificateless Signcryption Scheme Of Barbosa Et Almentioning
confidence: 99%
“…To the best of our knowledge, there exist four ( [4], [2], [14] and [5]) certificateless signcryption schemes (CLSC) in the literature. Among these four, [4], [2] and [14] are pairing based and [5] uses pairing for public key verification alone.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation