Construction of identity based signcryption schemes

4Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we show how to construct an Identity Based Signcryption Scheme (IBSC) using an Identity Based Encryption (IBE) and an Identity Based Signature (IBS) schemes. We show that the security of the IBSC scheme-indistinguishability as well as unforgeablity-is derived from the security of the underlying IBE and IBS schemes. Moreover, we show that under mild (reasonable) assumptions, the scheme is both space and time efficient compared to the Sign-then-Encrypt approach. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Pandey, S. K., & Barua, R. (2011). Construction of identity based signcryption schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6513 LNCS, pp. 1–14). Springer Verlag. https://doi.org/10.1007/978-3-642-17955-6_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free