Efficient and proactive threshold signcryption

11Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To make the system more secure and robust, threshold schemes are proposed to avoid single point failure. At the same time, there are more and more applications which utilize the two basic blocks encryption and digital signature to secure message delivery (such as SSL, SSH). Combining the three tools organically leads to an interesting security tool termed as threshold signcryption which can be used in distributed systems especially the mobile networks. In this paper, we present an efficient threshold signcryption scheme. The scheme is designed for an asynchronous network model which may better present practical distributed systems, especially Internet or mobile ad hoc networks. In order to resist mobile attacks, we add proactive property to our scheme. To the best of our knowledge, the proposed scheme is the first threshold signcryption scheme which is noninteractive, proactive and provably secure and works on asynchronous network models. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Ma, C., Chen, K., Zheng, D., & Liu, S. (2005). Efficient and proactive threshold signcryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3650 LNCS, pp. 233–243). Springer Verlag. https://doi.org/10.1007/11556992_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free