2014
DOI: 10.1002/sec.1092
|View full text |Cite
|
Sign up to set email alerts
|

Proxy signcryption scheme in the standard model

Abstract: Proxy signcryption is a novel cryptographic primitive that combines the functionality of a proxy signature with that of a signcryption. However, the security of all the known proxy signcryption schemes were proven in the random oracle, which has received a lot of criticism that the proofs in the random oracle model are not sound with respect to the standard model. Hence, it is an interesting research problem on how to construct a provably secure proxy signcryption scheme in the standard model. In this paper, m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 28 publications
(47 reference statements)
0
11
0
Order By: Relevance
“…In 2015, Ming and Wang [34], a provable secured PS scheme under the theoretical analysis technique called standard model. However, the scheme is anguish from a number flaws that are it required more computing time due bilinear pairing heavy operations, certificate management issue, need more computing power, requires greater bandwidth space, lack of forward secrecy and lack antireplay attack.…”
Section: Ming Et Al [2014]mentioning
confidence: 99%
“…In 2015, Ming and Wang [34], a provable secured PS scheme under the theoretical analysis technique called standard model. However, the scheme is anguish from a number flaws that are it required more computing time due bilinear pairing heavy operations, certificate management issue, need more computing power, requires greater bandwidth space, lack of forward secrecy and lack antireplay attack.…”
Section: Ming Et Al [2014]mentioning
confidence: 99%
“…According to Cao et al [39], processing time unit for per PM is 6.38 ms and for unit E is counted 11.20 ms and one bilinear Pairing BP is 20.01 ms. Here we measure the operational cost of the proposed N-PSC scheme and compare it with the already existing schemes found in literature [23]- [27], [32]. The algorithmic complexity comparison is reflected in Table 2.…”
Section: B Game 2ndmentioning
confidence: 99%
“…In 2017, Bhatia and Verma [26] pointed out the vulnerability of the scheme [25] and presented an improved scheme as well. Ming and Wang [27] proposed a provable proxy signcryption scheme that is vulnerable and compromisable due to its security lapses. Additionally, the flavor of proxy signcryption (like multiproxy and threshold-proxy) having special functional were also proposed and found in literature [28]- [31].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, a proxy signcryption scheme just solves the problem. Many research works on proxy signcryption have been introduced [19][20][21].…”
Section: Introductionmentioning
confidence: 99%