2016
DOI: 10.1002/sec.1664
|View full text |Cite
|
Sign up to set email alerts
|

Threshold attribute‐based signcryption and its application to authenticated key agreement

Abstract: Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature‐then‐encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute‐based signcryption (ABSC), which simultaneously achieves the functionalities of attribute‐based encryption and attribute‐based signature, two important cryptographic primitives proposed to enfo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 23 publications
(33 reference statements)
0
4
0
Order By: Relevance
“…ABSC performs signcryption/unsigncryption based on a set of attributes (affiliation, job, etc.) of each participant and the access structure created based on it [7][8][9]. That is, it has the characteristics of ABE and ABS [5-6][20].…”
Section: Attribute Based Signcryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…ABSC performs signcryption/unsigncryption based on a set of attributes (affiliation, job, etc.) of each participant and the access structure created based on it [7][8][9]. That is, it has the characteristics of ABE and ABS [5-6][20].…”
Section: Attribute Based Signcryptionmentioning
confidence: 99%
“…And has the data been tampered with? To solve this problem, many scholars have researched attributebased signcryption scheme [7][8][9]. Attribute-based signcryption is a security technology that combines the characteristics of attribute-based signature and attribute-based encryption.…”
Section: Introductionmentioning
confidence: 99%
“…e primitive is a solution to the problems mentioned earlier, but is much less efficient when compared to our scheme in term of communication overhead and computation. Following the above work, several researchers proposed some works [33][34][35] to improve ABSC schemes in terms of applications and concrete construction in the standard model, efficient constructions, and formal security models, respectively. Pandit et al [33] provided an ABSC scheme in a standard model.…”
Section: Related Workmentioning
confidence: 99%
“…e ABSC-based linear codes secret sharing scheme was introduced by Song et al in [34]. e access control system based on ABSC scheme was proposed by Zheng et al in [35]. ey showed that the key agreement scheme, an important tool for the access control system, can be constructed efficiently with ABSC.…”
Section: Related Workmentioning
confidence: 99%