2010
DOI: 10.1016/j.tcs.2010.06.003
|View full text |Cite
|
Sign up to set email alerts
|

Provable secure identity based generalized signcryption scheme

Abstract: According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Comparing with existing identity based generalized signcryption, the new scheme h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 13 publications
0
23
0
Order By: Relevance
“…Wang et al [10] gave a formal definition and security model of GSC in the PKI setting for the first time and improved the scheme [4] in 2010. Later, Yu et al [11] proposed an identity-based GSC scheme and a security model in the same year. Kushwah and Lal [12] simplified the security model of scheme [11] and proposed a more efficient identitybased GSC scheme in 2011.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al [10] gave a formal definition and security model of GSC in the PKI setting for the first time and improved the scheme [4] in 2010. Later, Yu et al [11] proposed an identity-based GSC scheme and a security model in the same year. Kushwah and Lal [12] simplified the security model of scheme [11] and proposed a more efficient identitybased GSC scheme in 2011.…”
Section: Related Workmentioning
confidence: 99%
“…Later, Yu et al [11] proposed an identity-based GSC scheme and a security model in the same year. Kushwah and Lal [12] simplified the security model of scheme [11] and proposed a more efficient identitybased GSC scheme in 2011. Zhou et al [13] proposed a certificateless GSC scheme that can resist a malicious-butpassive KGC attack [14] in 2014.…”
Section: Related Workmentioning
confidence: 99%
“…According to Yu et al's scheme [21], the abilities of an adversary are formally modeled by queries issued by adversities. Each adversary may issue the following queries:…”
Section: Security Modelmentioning
confidence: 99%
“…We compare the efficiency and security of our scheme with those of three identity based generalized signcryption schemes, including Lal et al's scheme [20], Yu et al's scheme [21] and Kushwah et al's scheme [22]. We denote the modular exponentiation and the pairing computation by E, P, respectively.…”
Section: Efficiencymentioning
confidence: 99%
“…In the same year, Boyen [15] proposed a multi-purpose signcryption scheme together with a comprehensive security model for a multi-purpose identitybased signcryption cryptosystem. After that, many identitybased signcryption schemes were proposed [16]- [21]. In 2008, Selvi and others [22] also proposed the first concept of certificateless signcryption.…”
Section: Related Workmentioning
confidence: 99%