[go: up one dir, main page]

Lal et al., 2007 - Google Patents

New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings

Lal et al., 2007

View PDF
Document ID
13990853375204935885
Author
Lal S
Singh T
Publication year
Publication venue
arXiv preprint cs/0701044

External Links

Snippet

This paper presents an identity based multi-proxy multi-signcryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the coopration of all members in the original signcryption group. Then the proxy signcryption …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Baek et al. Identity-based threshold signature scheme from the bilinear pairings
Baek et al. A survey of identity-based cryptography
Wu et al. A new efficient certificateless signcryption scheme
Li et al. Hidden attribute-based signatures without anonymity revocation
Baek et al. Identity-based threshold decryption
Gagné et al. Threshold attribute-based signcryption
Li et al. Indentity-based broadcast signcryption
Nalla et al. Signcryption scheme for identity-based cryptosystems
Gupta et al. On securing bi-and tri-partite session key agreement protocol using IBE framework
Lai et al. Self-generated-certificate public key encryption without pairing and its application
Cao et al. An efficient ID-based deniable authentication protocol from pairings
Seo et al. Identity-based universal designated multi-verifiers signature schemes
Zhou et al. Certificate-based generalized ring signcryption scheme
Li et al. ID-based Signcryption Scheme with (t, n) Shared Unsigncryption.
Lal et al. New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings
Xu et al. Identity based threshold proxy signature
Li et al. ID-based threshold proxy signcryption scheme from bilinear pairings
Elkamchouchi et al. A new proxy identity-based signcryption scheme for partial delegation of signing rights
Yang et al. Efficient mediated certificates public-key encryption scheme without pairings
Qian et al. A new threshold proxy signature scheme from bilinear pairings
Libert et al. What is possible with identity based cryptography for PKIs and what still must be improved
Swapna et al. Efficient identity based multi-signcryption scheme with public verifiability
Chang An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Hölbl et al. Comparative study of tripartite identity-based authenticated key agreement protocols
Saxena Threshold ski protocol for id-based cryptosystems