Abstract | ||
---|---|---|
Signcryption is to perform encryption and signature in a single logical step, and is more efficient than the sign-then-encryption scheme. However, most of the proposed signcryption approaches cannot be used directly by certified e-mail protocol. In this paper, we first develop an id-based signcryption method, which allows a trusted third party to compute a cipher text of a message together with other parties. Then based on the signcryption scheme we propose a new id-based certified e-mail protocol. The fairness, efficiency, and effectiveness of our protocol have been proved. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/IIH-MSP.2009.127 | IIH-MSP |
Keywords | Field | DocType |
cipher text,proposed signcryption,single logical step,signcryption scheme,sign-then-encryption scheme,certified e-mail protocol,certified e-mail,new id-based certified e-mail,id-based signcryption method,id based cryptography,digital signatures,data mining,cryptography,trusted third party,protocols,generators,cryptographic protocols | Cryptographic protocol,Computer science,Computer security,Cryptography,Computer network,Digital signature,Signcryption,Encryption,Artificial intelligence,ID-based cryptography,Trusted third party,Pattern recognition,Ciphertext | Conference |
Citations | PageRank | References |
1 | 0.34 | 13 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Caifen Wang | 1 | 19 | 9.18 |
Xiaodong Yang | 2 | 5 | 6.51 |
Caihui Lan | 3 | 5 | 1.42 |
Xiaojun Cao | 4 | 530 | 74.55 |