Secure delegation-by-warrant ID-based proxy signcryption scheme

Shanshan Duan, Zhenfu Cao, Yuan Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

In this paper, we first construct a security model for delegation-by- warrant ID-based proxy signcryption schemes and formalize notions of security for them. To the best of our knowledge, no related work has been done. Then we present such a scheme based on the bilinear pairings, and show that it is provably secure in the random oracle model. Specifically, we prove its semantic security under the DBDH assumption and its unforgeability under the BDH assumption.

Original languageEnglish
Title of host publicationComputational Intelligence and Security - International Conference, CIS 2005, Proceedings
Pages445-450
Number of pages6
DOIs
StatePublished - 2005
Externally publishedYes
EventInternational Conference on Computational Intelligence and Security, CIS 2005 - Xi'an, China
Duration: 15 Dec 200519 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3802 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Computational Intelligence and Security, CIS 2005
Country/TerritoryChina
CityXi'an
Period15/12/0519/12/05

Fingerprint

Dive into the research topics of 'Secure delegation-by-warrant ID-based proxy signcryption scheme'. Together they form a unique fingerprint.

Cite this