Identity-based hybrid signcryption

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

10 引用 (Scopus)

抜粋

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then- encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in identity-based setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In particular, we extend the concept of signcryption key encapsulation mechanism to the identitybased setting. We show that an identity-based signcryption scheme can be constructed by combining an identity-based signcryption key encapsulation mechanism with a data encapsulation mechanism. We also give an example of identitybased signcryption key encapsulation mechanism.

元の言語英語
ホスト出版物のタイトルProceedings - International Conference on Availability, Reliability and Security, ARES 2009
ページ534-539
ページ数6
DOI
出版物ステータス出版済み - 10 12 2009
イベントInternational Conference on Availability, Reliability and Security, ARES 2009 - Fukuoka, Fukuoka Prefecture, 日本
継続期間: 3 16 20093 19 2009

出版物シリーズ

名前Proceedings - International Conference on Availability, Reliability and Security, ARES 2009

その他

その他International Conference on Availability, Reliability and Security, ARES 2009
日本
Fukuoka, Fukuoka Prefecture
期間3/16/093/19/09

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality

フィンガープリント Identity-based hybrid signcryption' の研究トピックを掘り下げます。これらはともに一意のフィンガープリントを構成します。

  • これを引用

    Li, F., Shirase, M., & Takagi, T. (2009). Identity-based hybrid signcryption. : Proceedings - International Conference on Availability, Reliability and Security, ARES 2009 (pp. 534-539). [5066522] (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009). https://doi.org/10.1109/ARES.2009.44