-
Chapter and Conference Paper
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys
So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir’s threshold secret share scheme. Self-certified public key system has att...
-
Chapter and Conference Paper
Constructing Secure Warrant-Based Proxy Signcryption Schemes
Proxy signcryption, proposed by Gamage et al. [1], is a cryptographic primitive, which combines the functionality of a proxy signature scheme with that of an encryption. But to date, no formal definitions of s...
-
Chapter and Conference Paper
An Efficient Proxy-Protected Signature Scheme Based on Factoring
Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, mos...
-
Chapter and Conference Paper
Constructing Secure Proxy Cryptosystem
Proxy cryptosystem was first proposed by Mambo and Okamoto, for the delegation of the power to decrypt ciphertexts. However, to our knowledge, there is no reasonable mode aimed at this cryptographic notion. In...
-
Chapter and Conference Paper
Encryption Based on Reversible Second-Order Cellular Automata
In this paper, we present a novel cryptosystem based on reversible second-order cellular automata. The cryptosystem is featured by its large key space and high speed due to cellular automata’s parallel informa...
-
Chapter and Conference Paper
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme
Signcryption denotes a cryptographic method, which can process encryption and digital signature simultaneously. So, adopting such schemes, computational cost of encryption and signature compared to traditional...
-
Chapter and Conference Paper
Two Proxy Signcryption Schemes from Bilinear Pairings
Proxy signcryption is a cryptographic primitive which combines the functionalities of a proxy signature scheme and a signcryption scheme. In this paper, based on bilinear pairings, we would like to propose two...
-
Chapter and Conference Paper
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme
A novel ID-based proxy-protected signature scheme based on identity information is presented in this paper. We review the concept ID-Based signature introduced by Shamir, define the security notion of an ID-Ba...
-
Chapter and Conference Paper
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings
Authenticated key agreement protocols are essential for secure communications in open and distributed environments. In 2004, Ryu et al. proposed an efficient two-party identity-based authenticated key agreemen...
-
Chapter and Conference Paper
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy
With the flourish of applications over the wired /wireless networks, how to keep user’s privacy has drawn growing concerns in recent years. Although the issue of user anonymity has been addressed in digital si...
-
Chapter and Conference Paper
Security Model of Proxy-Multi Signature Schemes
In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Although some work has been done in proxy-multi signature schemes, until now th...
-
Chapter and Conference Paper
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can provide confidentiality and authent...
-
Chapter and Conference Paper
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque
To put restrictions on signing capability of the proxy signer, the notion of one-time proxy signature was put forth by Kim et al. in 2001. Today, to our best knowledge, although plenty of one-time proxy signat...
-
Chapter and Conference Paper
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In add...
-
Chapter and Conference Paper
Proxy Re-signature Schemes Without Random Oracles
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by At...
-
Chapter and Conference Paper
Short Group Signature Without Random Oracles
We construct a short group signature which is proven secure without random oracles. By making certain reasonable assumptions and applying the technique of non-interactive proof system, we prove that our scheme...
-
Chapter and Conference Paper
An Efficient Certified Email Protocol
A certified email protocol, also known as a non-repudiation protocol, allows a message to be exchanged for an acknowledgement of reception in a fair manner: a sender Alice sends a message to a receiver Bob if ...
-
Chapter and Conference Paper
Transitive Signatures from Braid Groups
Transitive signature is an interesting primitive due to Micali and Rivest. During the past years, many constructions of transitive signatures have been proposed based on various assumptions. In this paper, we ...
-
Chapter and Conference Paper
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
An attribute based encryption scheme (ABE) is a cryptographic primitive in which every user is identified by a set of attributes, and some function of these attributes is used to determine the ability to decry...
-
Chapter and Conference Paper
CCA-Secure Proxy Re-encryption without Pairings
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to it...