Lal et al., 2007 - Google Patents
New ID Based Multi-Proxy Multi-Signcryption Scheme from PairingsLal et al., 2007
View PDF- Document ID
- 13990853375204935885
- Author
- Lal S
- Singh T
- Publication year
- Publication venue
- arXiv preprint cs/0701044
External Links
Snippet
This paper presents an identity based multi-proxy multi-signcryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the coopration of all members in the original signcryption group. Then the proxy signcryption …
- 239000003795 chemical substances by application 0 description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baek et al. | Identity-based threshold signature scheme from the bilinear pairings | |
Baek et al. | A survey of identity-based cryptography | |
Wu et al. | A new efficient certificateless signcryption scheme | |
Li et al. | Hidden attribute-based signatures without anonymity revocation | |
Baek et al. | Identity-based threshold decryption | |
Gagné et al. | Threshold attribute-based signcryption | |
Li et al. | Indentity-based broadcast signcryption | |
Nalla et al. | Signcryption scheme for identity-based cryptosystems | |
Gupta et al. | On securing bi-and tri-partite session key agreement protocol using IBE framework | |
Lai et al. | Self-generated-certificate public key encryption without pairing and its application | |
Cao et al. | An efficient ID-based deniable authentication protocol from pairings | |
Seo et al. | Identity-based universal designated multi-verifiers signature schemes | |
Zhou et al. | Certificate-based generalized ring signcryption scheme | |
Li et al. | ID-based Signcryption Scheme with (t, n) Shared Unsigncryption. | |
Lal et al. | New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings | |
Xu et al. | Identity based threshold proxy signature | |
Li et al. | ID-based threshold proxy signcryption scheme from bilinear pairings | |
Elkamchouchi et al. | A new proxy identity-based signcryption scheme for partial delegation of signing rights | |
Yang et al. | Efficient mediated certificates public-key encryption scheme without pairings | |
Qian et al. | A new threshold proxy signature scheme from bilinear pairings | |
Libert et al. | What is possible with identity based cryptography for PKIs and what still must be improved | |
Swapna et al. | Efficient identity based multi-signcryption scheme with public verifiability | |
Chang | An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks | |
Hölbl et al. | Comparative study of tripartite identity-based authenticated key agreement protocols | |
Saxena | Threshold ski protocol for id-based cryptosystems |