Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,541,367 papers from all fields of science
Search
Sign In
Create Free Account
Signcryption
Known as:
امضارمز
In cryptography, signcryption is a public-key primitive that simultaneously performs the functions of both digital signature and encryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Authenticated encryption
Authentication
Confidentiality
Cryptography
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
An efficient IND-CCA2 secure Paillier-based cryptosystem
Angsuman Das
,
A. Adhikari
Information Processing Letters
2012
Corpus ID: 7290364
2010
2010
Identity Based Public Verifiable Signcryption Scheme
S. Sharmila
,
Deva Selvi
,
S. Vivek
,
Pandu Rangan
Provable Security
2010
Corpus ID: 18440976
Signcryption as a cryptographic primitive that offers both confidentiality and authentication simultaneously. Generally, in…
Expand
2005
2005
Analysis and Improvement of a Signcryption Scheme with Key Privacy
Guomin Yang
,
D. Wong
,
Xiaotie Deng
Information Security Conference
2005
Corpus ID: 2046248
In PKC'04, a signcryption scheme with key privacy was proposed by Libert and Quisquater. Along with the scheme, some security…
Expand
2005
2005
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
T. Okamoto
,
R. Tso
,
E. Okamoto
Modeling Decisions for Artificial Intelligence
2005
Corpus ID: 40646012
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this…
Expand
2005
2005
An Identity-Based Threshold Signcryption Scheme with Semantic Security
Changgen Peng
,
Xiang Li
International Conference on Computational…
2005
Corpus ID: 39313565
This paper designs a secure identity-based threshold signcryption scheme from the bilinear pairings. The construction is based on…
Expand
Highly Cited
2005
Highly Cited
2005
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
Tsz Hon Yuen
,
V. Wei
The Cryptographer's Track at RSA Conference
2005
Corpus ID: 330613
We present the first blind identity-based signcryption(BIBSC). We formulate its security model and define the security notions of…
Expand
Highly Cited
2004
Highly Cited
2004
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
Benoît Libert
,
J. Quisquater
International Conference on Theory and Practice…
2004
Corpus ID: 5604544
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the Diffie-Hellman problem in Gap…
Expand
Highly Cited
2004
Highly Cited
2004
Improved Signcryption from q-Diffie-Hellman Problems
Benoît Libert
,
J. Quisquater
International Conference on Security and…
2004
Corpus ID: 11515771
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the hardness of q-Diffie-Hellman…
Expand
2002
2002
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages
J. Coron
,
H. Handschuh
,
M. Joye
,
Pascal Paillier
,
D. Pointcheval
,
Christophe Tymen
International Conference on Theory and Practice…
2002
Corpus ID: 1696198
This paper considers arbitrary-length chosen-ciphertext secure asymmetric encryption, thus addressing what is actually needed for…
Expand
1998
1998
Efficient Signcryption Schemes on Elliptic Curves
Yuliang Zheng
,
H. Imai
1998
Corpus ID: 118924279
Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulllls both…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE