On the Provable Security of Multi-Receiver Signcryption Schemes (original) (raw)
Related papers
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
2009
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
2009
A note on the Certificateless Multi-receiver Signcryption Scheme
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
Arxiv preprint arXiv:0909.1412, 2009
Identity Based Public Verifiable Signcryption Scheme
2010
New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings
Eprint Arxiv Cs 0701044, 2007
On the Security of Identity Based Ring Signcryption Schemes
Lecture Notes in Computer Science, 2009
Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs *
Journal of Information Science and Engineering, 2012
An Efficient Generalized Multi Recipient Signcryption Scheme
Identity based hybrid signcryption revisited
2012 International Conference on Information Technology and e-Services, 2012
19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), 2005
An identity based ring signcryption scheme with public verifiability
2010 International Conference on Security and Cryptography (SECRYPT), 2010
Signcryption scheme for Identity-based Cryptosystems
IACR Cryptol. ePrint Arch., 2003
New identity based signcryption schemes from pairings
IEEE Transactions on Information Theory, 2000
Anonymous ID Based Signcryption Scheme for Multiple Receivers
2009
A new identity based signcryption scheme from pairings
2003
A Public Verifiability Signcryption Scheme without Pairings
International Journal of Computer Applications, 2017
An Efficient identity based Multi-receiver Signcryption Scheme using ECC
2013
A Revocable ID-based Signcryption Scheme
J. Inf. Hiding Multim. Signal Process., 2012
A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme
Information
Provable Secure Identity Based Signcryption Schemes without Random Oracles
International Journal of Network Security & Its Applications, 2012
An Identity-Based Ring Signcryption Scheme
2012
Different Authentication Properties and a Signcryption Scheme Revisited
2009 International Conference on Computational Intelligence and Security, 2009
Seminar report on " Signcryption Approaches for Network Security "
Identity based Signcryption and security attacks and prevention- A Survey
International Journals for Researchers [ER Publication, WOAR Journals, IJEAS and IJEART]
On the Security of Certificateless Signcryption Schemes
On the security of two ring signcryption schemes
2009
The Joint Signature and Encryption Revisited ∗
2013
ENHANCED IDENTITY-BASED SIGNCRYPTION SYSTEM
Transstellar, 2019
Signcryption in Hierarchical Identity Based Cryptosystem
2005
Formal Proofs for the Security of Signcryption
Journal of Cryptology, 2007
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
Lecture Notes in Computer Science, 2005
Provably Secure ID-based Broadcast Signcryption (IBBSC) Scheme