Open Access
Issue |
MATEC Web Conf.
Volume 139, 2017
2017 3rd International Conference on Mechanical, Electronic and Information Technology Engineering (ICMITE 2017)
|
|
---|---|---|
Article Number | 00037 | |
Number of page(s) | 7 | |
DOI | https://doi.org/10.1051/matecconf/201713900037 | |
Published online | 05 December 2017 |
- Zheng Y. Digital signcryption or how to achieve cost in AdvancesinCryptology’97 on Springer, 1997. pp.165–179. [Google Scholar]
- Sun, Li H.Efficient signcryption between TPKC and IDPKC and its multi-receiver construction, Science China Information Sciences, Vol 53, 2010, pp.557–566. [Google Scholar]
- Shamir Identity-Based cryptosystems and signature schemes, Springer, Heidelberg, 1985, pp.47–53. [Google Scholar]
- An JH., Dodis Y., and Rabin T. On the Security of Joint Signature and Encryption, Springer, Berlin, 2002, pp.83–107. [Google Scholar]
- Huang Q., Wong DS., and Yang G. Heterogeneous signcryption with key Privacy, Computer Journal, Vol 54, 2011, pp.525–536. [Google Scholar]
- Fu, Li, and Liu W. IDPKC-to-TPKC construction of multi-receiver signcryption, Proceedings of the INCoS (5) on IEEE, 2013, pp.335- 339. [Google Scholar]
- Li, Zhang H., and Takagi T. Efficient signcryption for heterogeneous systems, IEEE Systems Journal, Vol 7, 2013, pp.420–429. [Google Scholar]
- Zhang et al, CLPKC-to-TPKI Heterogeneous Signcryption Scheme with Anonymity, Acta Electronica Sinica, Vol 44, 2016, pp.2432–2439. [Google Scholar]
- Al-Riyami SS., and Paterson KG. Certificateless public key cryptography, Advances in Cryptology-Asiacrypt on Springer, 2003, pp.452–473. [Google Scholar]
- Zhou YW., Yang B., and Zhang WZ. Provably secure and efficient certificateless generalized signcryption, Chinese Journal of Computers, Vol 39, 2016, pp.543–551. [Google Scholar]
- Li Y., Wang C., Zhang Y., and Niu S. Privacy preserving multi‐receiver signcryption scheme for heterogeneous systems, Security & Communication Networks, Vol 9, 2017, pp.4574–4584. [Google Scholar]
- Li F., Shirase M., and Takagi T. Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks, Information Security and Cryptology on Springer, 2009, pp.289–304. [Google Scholar]
- Al-Riyami, S. S, Paterson, and K. G. Certificateless public key cryptography. International Conference on the Theory and Application of Cryptology, Springer, Berlin, 2003, pp.452–473. [Google Scholar]
- Bellare, M. and Rogaway P. Random Oracles are Practical, 1993, pp.366–368. [Google Scholar]
- Bao F., Deng RH., and Zhu HF. Variations of Diffie-Hellman Problem, in Information and Communications Security, Huhehaote, China, 2003, pp.301–312. [Google Scholar]
- Chow SSM., Yiu SM., and Hui LCK. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity, Vol 2971, 2004, pp.352–369. [Google Scholar]
- PBC Library. http://crypto.stanford.edu/pbc/. [Google Scholar]
- Li, Fagen, Y. Han, and C. Jin. Practical access control for sensor networks in the context of the Internet of Things , Computer Communications, Vol 89,2016, pp.154–164. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.