Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Apr 8, 2010 · In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model.
Sep 6, 2010 · In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than the existing model.
According to actual needs, a generalized signcryption scheme can flexibly work as an en- cryption scheme, a signature scheme or a signcryption scheme.
We give an improved Generalized Signcryption scheme based on ECDSA and give its security proof . ... Propose generalized signcryption schemes based on identity- ...
This paper introduces a formal security model for certificateless generalized signcryption schemes secure against the malicious-but-passive key generation ...
In this paper, we propose an identity-based GPSC scheme in the random oracle model by using bilinear pair- ings. Then, we prove the confidentiality of our ...
According to actual needs, a generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme.
In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than the existing model. Secondly, we ...
In this paper, a multi-receiver identity-based generalized signcryption scheme (MID-GSC) is proposed, the formal definition and security notions are defined, ...
Provable security is the basic requirement for ID-based generalized signcryption schemes. The security of all of the schemes [20,21,22] described above was only ...