
CLC number: TP309
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2017-07-14
Cited: 0
Clicked: 10036
Hui-fang Yu, Bo Yang. Low-computation certificateless hybrid signcryption scheme[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.1601054 @article{title="Low-computation certificateless hybrid signcryption scheme", %0 Journal Article TY - JOUR
低计算复杂度的无证书混合签密方案关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Dent, A.W., 2005. Hybrid signcryption schemes with insider security. LNCS, 3574:253-266. ![]() [2]Hwang, R.J., Lai, C.H., Su, F.F., 2005. An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl. Math. Comput., 167:870-881. ![]() [3]Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Comput., 48(177):203-209. ![]() [4]Li, F.G., Liao, Y.J., Qin, Z.G., et al., 2012. Further improvement of an identity-based signcryption scheme in the standard model. Comput. Electr. Eng., 38(2):413-421. ![]() [5]Li, F.G., Shirase, M., Takagi, T., 2013. Certificateless hybrid signcryption. Math. Comput. Model., 57(3-4):324-343. ![]() [6]Li, F.G., Zheng, Z.H., Jin, C.H., 2016. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst., 62(4):625-639. ![]() [7]Pang, L.J., Cui, J.J., Li, H.X., et al., 2011. A new multi-receiver ID-based anonymous signcryption. Chin. J. Comput., 34(11):2104-2113. ![]() [8]Sun, Y.X., Li, H., 2011. Efficient certificateless hybrid signcryption. J. Softw., 22(7):1690-1698. ![]() [9]Szczechowiak, P., Oliveira, L.B., Scott, M., et al., 2008. Testing the limits of elliptic curve cryptography in sensor networks. LNCS, 4913:305-320. ![]() [10]Tan, C.H., 2008. Insider-secure signcryption KEM/tag-KEM schemes without random oracles. 3rd Int. Conf. on Availability, Reliability and Security, p.1275-1281. ![]() [11]Wang, D.X., Teng, J.K., 2015. Provably secure identity-based aggregate signcryption scheme. J. Comput. Appl., 35(2): 412-415. ![]() [12]Wang, F.H., Hu, Y.P., Wang, C.X., 2012. Post-quantum secure hybrid signcryption from lattice assumption. Appl. Math. Inform. Sci., 6(1):23-28. ![]() [13]Youn, T.Y., Hong, D., 2012. Signcryption with fast online signing and short signcryptext for secure and private communication. Sci. China Inform. Sci., 55(11):2530-2541. ![]() [14]Yu, H.F., Yang, B., 2015a. Identity-based hybrid signcryption scheme using ECC. J. Softw., 26(12):3174-3182. ![]() [15]Yu, H.F., Yang, B., 2015b. Provable secure certificateless hybrid signcryption. Chin. J. Comput., 38(4):804-813. ![]() [16]Zhang, B., Xu, Q.L., 2010. Identity-based multi-signcryption scheme without random oracles. Chin. J. Comput., 33(1):103-110. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE | ||||||||||||||


ORCID:
Open peer comments: Debate/Discuss/Question/Opinion
<1>