An efficient signcryption scheme with key privacy

34Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In Information Processing Letters 2006, Tan pointed out that the anonymous signcryption scheme proposed by Yang, Wong and Deng (YWD) in ISC 2005 provides neither confidentality nor anonymity. However, no discussion has been made on whether YWD scheme can be made secure. In this paper, we propose a modification of YWD scheme which resolves the security issues of the original scheme without sacrificing its high efficiency and simple design. Indeed, we show that our scheme achieves confidentiality, existential unforgeability and anonymity with more precise reduction bounds. In addition, our scheme further improves the efficiency when compared with YWD, with reduced number of operations for both signcryption and de-signcryption. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Li, C. K., Yang, G., Wong, D. S., Deng, X., & Chow, S. S. M. (2007). An efficient signcryption scheme with key privacy. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4582 LNCS, pp. 78–93). Springer Verlag. https://doi.org/10.1007/978-3-540-73408-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free