2004
DOI: 10.1007/978-3-540-24691-6_26
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Abstract. Boyen [7] gave the first identity-based (ID-based) signcryption scheme that is forward secure, publicly verifiable as well as provably secure. However, his scheme aims at providing ciphertext unlinkability and anonymity which is not a desirable property in applications such as authentication of encrypted messages by firewalls [11], where any third party should be able to verify the origin of the ciphertext without knowing the content of the message and getting any help from the intended recipient. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
76
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 134 publications
(76 citation statements)
references
References 19 publications
0
76
0
Order By: Relevance
“…Our scheme only needs to check 1 equation. Moreover, our scheme provides the ciphertext authenticity [8]. Anyone can verify the validity of the ciphertext without knowing the content of the message.…”
Section: Notice That We Computementioning
confidence: 99%
See 1 more Smart Citation
“…Our scheme only needs to check 1 equation. Moreover, our scheme provides the ciphertext authenticity [8]. Anyone can verify the validity of the ciphertext without knowing the content of the message.…”
Section: Notice That We Computementioning
confidence: 99%
“…Several ID-based signcryption schemes have been proposed so far, e.g. [4,6,7,8,16,19]. In addition, many variations of ID-based signcryption were proposed, for examples, IDbased proxy signcryption [13,15,26], ID-based threshold signcryption [10,17,18,21] and unsigncryption [14], and ID-based blind signcryption [27].…”
Section: Introductionmentioning
confidence: 99%
“…The knowledge of the plaintext m is not required for the public verification of a message's origin. Therefore, our scheme provides the ciphertext authenticity [5] which is very useful in firewalls [24] . If required, the anonymity property is obtained by scrambling the sender's public key Y S together with the message at step 3 of Signcrypt(i.e.…”
Section: Computementioning
confidence: 99%
“…Several practical identity-based schemes [8,9,10,11] have been devised since 1984. To date, several identity-based signcryption schemes have been developed in literature [12,13,14,15,16,17,18].…”
Section: Introductionmentioning
confidence: 99%