Position-based proxy signcryption

  • Qingshui Xue
  • , Fengying Li
  • , Guojian Ge
  • , Jiachen Shen
  • , Zhenfu Cao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Position-based cryptography has attracted lots of researchers' attentions. In mobile Internet, there are lots of position based security applications. For the first time, one new conception, position-based proxy signcryption is proposed. Based on a secure positioning protocol, one model of position-based proxy signcryption is proposed. In the model, positioning protocol is tightly bound to proxy signcryption, not loosely. Further, we propose one concrete position-based proxy signcryption scheme, its correctness is proved, and its security is also analyzed. As far as we know, it is the first position-based proxy signcryption scheme.

Original languageEnglish
Title of host publication2015 IEEE/CIC International Conference on Communications in China, ICCC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509002436
DOIs
StatePublished - 6 Apr 2016
Externally publishedYes
EventIEEE/CIC International Conference on Communications in China, ICCC 2015 - Shenzhen, China
Duration: 2 Nov 20155 Nov 2015

Publication series

Name2015 IEEE/CIC International Conference on Communications in China, ICCC 2015

Conference

ConferenceIEEE/CIC International Conference on Communications in China, ICCC 2015
Country/TerritoryChina
CityShenzhen
Period2/11/155/11/15

Keywords

  • Positioning protocol
  • UC security
  • model
  • proxy signcryption
  • scheme

Fingerprint

Dive into the research topics of 'Position-based proxy signcryption'. Together they form a unique fingerprint.

Cite this