Sciweavers

27 search results - page 1 / 6
» A secure extension of the Kwak-Moon group signcryption schem...
Sort
View
COMPSEC
2006
98views more  COMPSEC 2006»
13 years 5 months ago
A secure extension of the Kwak-Moon group signcryption scheme
Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert ...
ISW
2004
Springer
13 years 10 months ago
Security Analysis of Two Signcryption Schemes
Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-th...
Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-J...
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 5 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei
DRM
2008
Springer
13 years 7 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan