2011
DOI: 10.1002/cpe.1823
|View full text |Cite
|
Sign up to set email alerts
|

Efficient signcryption in the standard model

Abstract: SUMMARY Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature‐then‐encryption approach. The performance advantage of signcryption over the signature‐then‐encryption method makes signcryption useful in many applications, such as electronic commerce, mobile communications, and smart cards. In this paper, we propose an efficient signcryption scheme in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…We outline the security strength of our proposed scheme with related signcryption schemes in terms of computational cost in Table 1. The current existing schemes on keyinsulated signcryptions such as [10,11] are compared with and other ID-based signcryption cryptosystem schemes [31][32][33] are also compared with in terms of their security strength. Thus, the security parameters for our comparison includes IND-ID-CCA2 with key exposure (IND-ID-SC-KI-CCA2), EUF-CMA with key exposure (EUF-CMA-KI-SC-CMA), support for key insulation, cloud delegation and token generation.…”
Section: Comparisonmentioning
confidence: 99%
“…We outline the security strength of our proposed scheme with related signcryption schemes in terms of computational cost in Table 1. The current existing schemes on keyinsulated signcryptions such as [10,11] are compared with and other ID-based signcryption cryptosystem schemes [31][32][33] are also compared with in terms of their security strength. Thus, the security parameters for our comparison includes IND-ID-CCA2 with key exposure (IND-ID-SC-KI-CCA2), EUF-CMA with key exposure (EUF-CMA-KI-SC-CMA), support for key insulation, cloud delegation and token generation.…”
Section: Comparisonmentioning
confidence: 99%
“…In 2012, Li et al . proposed a new signcryption scheme; their scheme is more efficient and is provably secure in the standard model. Moreover, Li et al .…”
Section: Introductionmentioning
confidence: 99%
“…Shao [11] pointed out a weakness in Lv et al's basic scheme and presented a new scheme. In 2012, Li et al [12] proposed a new signcryption scheme; their scheme is more efficient and is provably secure in the standard model. Moreover, Li et al [13] proposed a first lattice-based signcryption scheme and is provably secure in the random oracle model.…”
Section: Introductionmentioning
confidence: 99%
“…Efficient signcryption in the standard model : An efficient signcryption scheme is proposed. Compared with Tan's scheme, it has |G| + |p| (320) bits shorter ciphertext, 2|p| − |G|(160) bits shorter private key, and |G| + |p| (1184) bits shorter public key.…”
mentioning
confidence: 99%