Identity-Based Online/Offline Signcryption Without Random Oracles |
Park, Seung-Hwan
(Graduate School of information Management and Security, Korea University)
Kim, Ki-Tak (Graduate School of information Management and Security, Korea University) Koo, Woo-Kwon (Graduate School of information Management and Security, Korea University) Lee, Dong-Hoon (Graduate School of information Management and Security, Korea University) |
1 | C. Gentry, "Practical Identity-Based Encryption Without Random Oracles," In: Vaudenay, S. (eds.) EUROCRYPT 2006. LNCS 4004, pp. 445-464, 2006. |
2 | F. Guo, Y. Mu and Z. Chen, "Identity- based online/offline encryption," In: Tsudik, G. (eds.) FC 2008. LNCS, vol.5143, pp. 247-261, 2008. |
3 | J. Li, X. Chen, F. Zhang and Y. Wang, "Generalization of the Selective-ID Security Model for HIBS Protocols," In: Y. Wang, Y. Chung, and H.Liu (ed.) CIS 2003, LNAI, vol.4456, pp. 894-902, 2007. |
4 | J.K. Liu and J. Zhou, "An Efficient Identity-Based Online/Offline Encryption Scheme" In: Abdalla, M. (eds.) ACNS 2009. LNCS 5536, pp. 156-167, 2009 |
5 | X. Boyen, "Multipurpose Identity-Based Signcryption A Swiss Army Knife for Identity-Based Cryptography" In: Boneh, D. (ed.) CRYPTO 2003, pp. 383-399, Aug. 2003. |
6 | R. Canetti, S. Halevi and J. Katz, "Chosen-ciphertext security from udentity- based encryption," In: Proceedings of Eurocrypt 2004, LNSC, pp. 207-222, 2004. |
7 | S. S. M. Chow, T. H. Yuen, L. C. K. Hui and S. M. Yiu, "Signcryption in Hierarchical Identity Based Cryptosystem," In: Security and Privacy in the Age of Ubiquitous Computing, Springer Boston, vol.181, pp. 443-457, 2005. DOI |
8 | S. Even, O. Goldreich, S. Micali, "Online/ Offline Digital signature," In: Brassard, G. (eds.) CRYPTO 1989. LNCS, vol.435, pp. 263-275, 1990. |
9 | D. Boneh, and M. Franklin, "Identity- Based Encryption from the Weil pairing," In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229, 2001. |
10 | D. Boneh and X. Boyeh, "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles," In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238, 2004. |
11 | J. K. Liu, J. Baek, J. Zhou, "Online/ Offline Identity-Baed Signcryption Re-visited," In: Cryptology ePrint Archive, Report 2010-274, May 2010. |
12 | J.K. Liu and J. Zhou, "An Efficient Identity-Based Online/Offline Encryption Scheme" In: Abdalla, M. (eds.) ACNS 2009. LNCS 5536, pp. 156-167, 2009 |
13 | S.F. Shahandashti and R. Safavi-Naini, "Theshold Attribute-Based Signatures and Their Application to Anonymous Credential systems," In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS 5580, pp. 198-216, 2009. |
14 | A. Shamir, "Identity-based cryptosystems and signature schemes," In: Advances in Cryptology -Crypto 1984,, LNSC 196, pp. 47-53, 1984 |
15 | B. Waters, "Efficient Identity-Based Encryption without Random Oracles," In: Cramer, R.J.F. (eds.) EUROCRYPT 2005. LNCS 3494, pp. 114-127, 2005. |
16 | Y. Yu, B. Yang, Y. Sun and S. Zhu, "Identity-Based Signcryption Scheme Without Random Oracles," In: CSI 2009. vol.31, pp. 56-62, 2009. |
17 | S. Xu, Y. Mu and W. Susilo, "Online/ Offline Signatures and Multisignatures for AVOD and DSR routing security," In: ACISP 06, LNCS 4058, pp. 99-110, 2006 |