On the Security of Identity Based Ring Signcryption Schemes
From MaRDI portal
Publication:3399211
DOI10.1007/978-3-642-04474-8_25zbMATH Open1307.94121OpenAlexW203803423MaRDI QIDQ3399211FDOQ3399211
Authors: S. Selvi, S. Sree Vivek, C. Pandu Rangan
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04474-8_25
Recommendations
confidentialitycryptanalysisprovable securityrandom oracle modelchosen plaintext attackbilinear pairingadaptive chosen ciphertext attackRing signcryption
Cites Work
Cited In (11)
- Cryptanalysis of Two Ring Signcryption Schemes
- On the Security of Identity Based Ring Signcryption Schemes
- Signcryption schemes with threshold unsigncryption, and applications
- The ring authenticated encryption scheme-how to provide a clue wisely
- Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
- A secure anonymous proxy signcryption scheme
- A note on an identity-based ring signature scheme with signer verifiability
- Identity based ring signcryption schemes revisited
- Title not available (Why is that?)
- Analysis and improvement of authenticatable ring signcryption scheme
- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
This page was built for publication: On the Security of Identity Based Ring Signcryption Schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3399211)