2005
DOI: 10.1007/bf02828661
|View full text |Cite
|
Sign up to set email alerts
|

Efficient identity based signcryption scheme with public verifiability and forward security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…ereafter, Lo and Tsai [16] initiated that the Lo and Tsai [15] scheme is vulnerable in terms of the chosen warrant attack (CWA). Hence, using BP, an identity-based proxy signcryption was proposed by Fei-Yu et al [17] where the forward secrecy public verifiability was the future aspects of the scheme.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…ereafter, Lo and Tsai [16] initiated that the Lo and Tsai [15] scheme is vulnerable in terms of the chosen warrant attack (CWA). Hence, using BP, an identity-based proxy signcryption was proposed by Fei-Yu et al [17] where the forward secrecy public verifiability was the future aspects of the scheme.…”
Section: Introductionmentioning
confidence: 99%
“…is scheme [17] was exploited as insecure by Wang et al [18]. ereafter, an Idbased proxy signcryption was proposed by Wang and Cao [19].…”
Section: Introductionmentioning
confidence: 99%