Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Dec 2, 2018 · A universally composable IBPSP consists of five probabilistic polynomial time algorithms: Setup, Extract, PKeyGen, ProxyS, and Uns. Moreover, it ...
In this paper, we construct an identity-based proxy signcryption protocol (IBPSP) based on the universally composable (UC) framework. In the random oracle ...
Abstract— The identity-based encryption (IBE) is one of the most important primitives in cryp- tography, and various security notions of IBE (e.g., ...
Missing: Signcryption. | Show results with:Signcryption.
The framework of universal composability (UC) is a general-purpose model for the analysis of cryptographic protocols. It guarantees very strong security ...
Missing: Signcryption. | Show results with:Signcryption.
Then, we construct a UC secure identity-based signcryption protocol π IDSC. Moreover, we shows that the identity-based signcryption π IDSC securely realizes the ...
The linkable ring signature supporting stealth addresses (SALRS) is a recently proposed cryptographic primitive, which is designed to comprehensively ...
Missing: Signcryption. | Show results with:Signcryption.
Universally composable signature, certification, and authentication. Abstract: Recently some efforts were made towards capturing the security requirements from ...
Missing: Signcryption. | Show results with:Signcryption.
... signcryption protocol (IBPSP) based on the universally composable (UC) framework. In the random oracle model, we prove that this protocol has the semantic ...
Dec 2, 2018 · In this paper, we construct an identity-based proxy signcryption protocol (IBPSP) based on the universally composable (UC) framework. In the ...
In this paper, we construct an identity-based proxy signcryption protocol (IBPSP) based on the universally composable (UC) framework. In the random oracle ...