Publications


The Beginning of Signcryption

1997

  1. Y. Zheng, Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption), Advances in Cryptology — Crypto’97, Lecture Notes in Computer Science, Vol. 1294, pp. 165-179, Springer-Verlag, 1997 (revised version).
    Also available:

The Evolution of Signcryption

1997

  1. Y. Zheng, Signcryption and Its Applications in Efficient Public Key Solutions, Proceedings of 1997 Information Security Workshop (ISW’97), Lecture Notes in Computer Science, Vol.1397, pp.291-312, Springer-Verlag, 1998. (invited lecture)
  2. Yuliang Zheng and Hideki Imai, Efficient and Unforgeable Multicast Conference Key Establishment without Relying on a Key Distribution Center, Proceedings of the 20th Symposium on Information Theory and Its Applications (SITA’97), pp365-368, Matsuyama, Japan, Dec. 2-5, 1997.
  3. Tsuyoshi Nishioka, Kanta Matsuura, Yuliang Zheng and Hideki Imai, A Proposal for Authenticated Key Recovery System, Proceedings of the 1997 Joint Workshop on Information Security and Cryptology (JW-ISC’97), pp.189-196, October 26-28, 1997, Seoul, Korea.
1998
  1. F. Bao and R. H. Deng, A Signcryption Scheme with Signature Directly Verifiable by Public Key, Public Key Cryptography (PKC’98), LNCS 1431, pp. 55-59. Springer-Verlag, 1998.
  2. Goichiro Hanaoka, Yuliang Zheng and Hideki Imai, LITESET: A Light-Weight Secure Electronic Transaction Protocol, ACISP 1998, LNCS 1438, pp. 215-226. Springer-Verlag, 1998.
  3. K. Matsuura and H. Imai, Toward Research-Promotion Infrastructure for Multi-Modal Imaging, 11th International Conference on Biomagnetism (BIOMAG98), Sendai, Aug. 1998.
  4. K. Matsuura, Y. Zheng and H. Imai, Compact and Flexible Resolution of CBT Multicast Key-Distribution, Proceedings of the Second International Conference on Worldwide Computing and Its Applications (WWCA’98), Lecture Notes in Computer Science, Vol. 1368, pp. 190–205, Springer-Verlag, 1998
  5. H. Petersen and M. Michels, Cryptanalysis and Improvement of Signcryption Schemes, IEE Proceedings – Computers and Digital Techniques, March 1998, Volume 145, Issue 2, p. 149-151.
  6. Y. Zheng, Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes, A submission to IEEE P1363 Standard Specifications for Public Key Cryptography. See also
  7. Y. Zheng and H. Imai, How to Construct Efficient Signcryption Schemes on Elliptic Curves, Information Processing Letters, 68(5), pp. 227-233, IEE Press, 1998.
    A preliminary version appeared as
  8. Y. Zheng and H. Imai, Compact and Unforgeable Key Establishment over an ATM Network, Proceedings of IEEE INFOCOM’98, pp.411-418, 29/3-3/4 1998, San Francisco. See also
1999
  1. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng, Encrypted Message Authentication by Firewalls, Proceedings of 1999 International Workshop on Practice and Theory in Public Key Cryptography (PKC’99), 1-3 March, 1999, Kamakura, Japan, LNCS, Vol.1560, pp.69-81, Springer-Verlag, 1999.
    Download the presentation slides.
  2. Chandana Gamage, Jussipekka Leiw and Yuliang Zheng, An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption, Computer Science — Proceedings of the 22nd Australasian Computer Science Conference (ACSC’99), pp.420-431, Auckland, January 1999. (Australian Computer Science Communications, Vol.21, No.1, Springer.)
  3. W.H. Ho and T.C. Wu, Cryptanalysis and Improvement of Petersen-Michels Signcryption Scheme, IEE Proceedings — Computers and Digital Techniques, Volume 146, Issue 2, March 1999 pp.123-124.
  4. M. Seo and K. Kim, Electronic Funds Transfer Protocol using Domain-verifiable Signcryption Scheme, Information Security and Cryptology – ICISC’99, LNCS 1787, pp. 269-277. Springer-Verlag, 2000.
  5. Chan Yeob Yeun, Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) – A Comparison, Cryptography and Coding 99, LNCS 1746. pp. 307-312. Springer-Verlag, 1999.
2000
  1. Y. Mu and V. Varadharajan, Distributed Signcryption, Indocrypt ’00, LNCS 1977, pp. 155-164, Springer-Verlag, 2000.
  2. R. Steinfeld and Y. Zheng, A Signcryption Scheme Based on Integer Factorization, Information Security Workshop (ISW ’00), LNCS 1975, pp. 308-322, Springer-Verlag, 2000.
  3. Xun Yi, Chee Kheong Siew, Xiao Feng Wang and Eiji Okamoto, A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments, Distributed and Parallel Databases, Vol.8, No.1, pp.85-117, January 2000.
2001
  1. Goichiro Hanaoka, Yuliang Zheng and Hideki Imai, Improving the Secure Electronic Transaction Protocol by Using Signcryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol.E84-A, No.8, pp.2042-2051, 2001.
  2. Dae Hyun Yum and Pil Joong Lee, New Signcryption Schemes Based on KCDSA, Information Security and Cryptology – ICISC 2001, LNCS 2288, pp. 305-317. Springer-Verlag, 2002.
  3. Yuliang Zheng, Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite, Proceedings of 2001 International Workshop on Practice and Theory in Public Key Cryptography (PKC2001), Chejo, Korea, LNCS, Vol.1992, pp.48-63, Springer-Verlag, February 2001.
    Download Presentation slides.
2002
  1. J. H. An, Y. Dodis and T. Rabin, On the Security of Joint Signature and Encryption, Eurocrypt 2002, LNCS 2332, pp. 83-107. Springer-Verlag, 2002.
  2. J. Baek, R. Steinfeld and Y. Zheng, Formal Proofs for the Security of Signcryption, Public Key Cryptography (PKC 2002), LNCS 2274, pp. 80-98, Springer-Verlag, 2002.
  3. Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee and Jong In Lim, Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption, Information Security and Cryptology – ICISC 2002, LNCS 2587, pp. 16-34. Springer-Verlag, 2003.
  4. D. Kwak, J. Ha, H. Lee, H. Kim and S. Moon, A WTLS Handshake Protocol with User Anonymity and Forward Secrecy, CDMA International Conference – CIC’2002, LNCS 2524, pp. 219-230. Springer-Verlag, 2002.
  5. J. Malone-Lee, Identity-Based Signcryption, Cryptology ePrint Archive Report 2002/098.
  6. Xiaolin Pang, Kian-Lee Tan, Yan Wang and Jian Ren, A Secure Agent-Mediated Payment Protocol, ICICS 2002, LNCS 2513, pp. 422-433. Springer-Verlag, 2002.
  7. J. Shin, K. Lee and K. Shim, New DSA-Verifiable Signcryption Schemes, Information Security and Cryptology (ICISC 2002), LNCS 2587, pp. 35-47, Springer-Verlag, 2003.
  8. Zhang Zhang, Mian Cai and Jin Qu, Signcryption Scheme with Threshold Shared Unsigncryption Preventing Malicious Receivers, Proceedings of 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering (TENCON ’02), Volume 1, Page(s):196 – 199, 28-31 Oct. 2002.
2003
  1. Mohamed Al-Ibrahim, A Signcryption Scheme Based on Secret Sharing Technique, Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2003), LNCS 2776, pp. 279-288. Springer-Verlag, 2003.
  2. X. Boyen, Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography, Crypto ’03, LNCS 2729, pp. 383-399, Springler-Verlag, 2003. Also appeared as Cryptology ePrint Archive Report 2003/163
  3. S. S. M. Chow, S. M. Yiu, L. C. K. Hui, and K. P. Chow, Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity, Information Security and Cryptology (ICISC 2003), LNCS 2971, pp. 352-369, Springer-Verlag, 2004.
  4. Y. Dodis and J. H. An, Concealment and Its Applications to Authenticated Encryption, Eurocrypt 2003, LNCS 2656, pp. 312-329, Springer-Verlag, 2003.
  5. Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish, Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings, Cryptology ePrint Archive Report 2003/043.
  6. Yitchak Gertner and Amir Herzberg, Committing Encryption and Publicly-Verifiable SignCryption, Cryptology ePrint Archive Report 2003/254.
  7. Hui-Feng Huang and Chin-Chen Chang, An Efficient Convertible Authenticated Encryption Scheme and Its Variant, Information and Communications Security (ICICS’03), LNCS 2836, pp. 382-392. Springer-Verlag, 2003.
  8. D. Kwak and S. Moon, Efficient Distributed Signcryption Scheme as Group Signcryption, Applied Cryptography and Network Security (ACNS ’03), LNCS 2846, pp. 403-417, Springer-Verlag, 2003.
  9. Ji-Guo Li, Jian-Zhong Li, Zhen-Fu Cao and Yi-Chen ZHANG, A Nonrepudiable Threshold Proxy Signcryption Scheme with Known Proxy Agent, Journal of Software, Vol.14, No.12, pp.2021-2027, 2003.
  10. Beno t Libert and Jean-Jacques Quisquater, New Identity Based Signcryption Schemes from Pairings, IEEE Information Theory Workshop 2003, pages 155-158, 2003. Also appeared as Cryptology ePrint Archive Report 2003/023.
  11. J. Malone-Lee and W. Mao, Two Birds One Stone: Signcryption Using RSA, CT-RSA 2003, LNCS 2612, pp. 211-225, Springer-Verlag, 2003.
  12. D. Nalla and K. C. Reddy, Signcryption scheme for Identity-based Cryptosystems, Cryptology ePrint Archive Report 2003/066.
  13. J. Nutzel and R. Grimm, Potato System and Signed Media Format – an Alternative Approach to Online Music Business, Proceedings of Third International Conference on Web Delivering of Music (WEDELMUSIC 2003), 15-17 Sept. 2003, pp. 23-26.
  14. Xiaolin Pang, Barbara Catania and Kian-Lee Tan, Securing Your Data in Agent-Based P2P Systems, Proceedings of the Eighth International Conference on Database Systems for Advanced Applications, pp.55-64, IEEE Computer Society, 2003.
  15. J. Pieprzyk and D. Pointcheval, Parallel Authentication and Public-Key Encryption, Australasian Conference on Information Security and Privacy (ACISP 2003), LNCS 2727, pp. 387- 401, Springer-Verlag, 2003.
  16. Anshuman Rawat and Shabsi Walfish, A Parallel Signcryption Standard using RSA with PSEP, Project Report, May 2003.
  17. Shahrokh Saeednia, Steve Kremer and Olivier Markowitch, An Efficient Strong Designated Verifier Signature Scheme, 6th International Conference on Information Security and Cryptology (ICISC 2003), Lecture Notes in Computer Science, pages 40-54, Seoul, Korea, November 2003. Springer-Verlag.
  18. R. Sakai and M. Kasahara, ID based Cryptosystems with Pairing on Elliptic Curve, Cryptology ePrint Archive Report 2003/054.
  19. Ilia Toli, Hidden Polynomial Cryptosystems, Cryptology ePrint Archive Report 2003/061.
2004
  1. Omaima Bamasak and Ning Zhang, A Secure Method for Signature Delegation to Mobile Agents, Proceedings of the 2004 ACM symposium on Applied computing, pp.813-818, ACM, 2004.
  2. M. Bohio and A. Miri, An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network, Proceedings of the Second Annual Conference on Communication Networks and Services Research, 19-21 May 2004, Page(s):69-74.
  3. L. Chen and J. Malone-Lee, Improved Identity-Based Signcryption, Cryptology ePrint Archive Archive, Report 2004/114.
  4. S. S. M. Chow, S. M. Yiu, L. C. K. Hui and K. P. Chow, Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity, 6th International Conference on Information Security and Cryptology — ICISC’2003, Lecture Notes on Computer Science 2971, Springer-Verlag (2004), pp. 352–369.
  5. S. S. M. Chow, T. H. Yuen, L. C. K. Hui and S. M. Yiu, Signcryption in Hierarchical Identity Based Cryptosystem, Cryptology ePrint Archive Report 2004/244.
  6. Alexander W. Dent, Hybrid Cryptography, Cryptology ePrint Archive Report 2004/210.
  7. Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki and Shabsi Walfish, Versatile Padding Schemes for Joint Signature and Encryption, ACM Conference on Computer and Communication Security (CCS), October 2004.
  8. Y. Dodis, M. J. Freedman, S. Jarecki and S. Walfish, Versatile Padding Schemes for Joint Signature and Encryption, ACM Conference on Computer and Communications Security (ACM-CCS 2004), pp. 344-353. ACM, 2004.
  9. Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish, Optimal Signcryption from Any Trapdoor Permutation, Cryptology ePrint Archive Report 2004/020.
  10. Shanshan Duan, Zhenfu Cao and Rongxing Lu, Robust ID-Based Threshold Signcryption Scheme from Pairings, Proceedings of the 3rd international conference on Information security InfoSecu’04, pp.33-37, ACM Press, 2004.
  11. R diger Grimm and Patrick Aichroth, Privacy Protection for Signed Media Files: A Separation-Of-Duty Approach to the Lightweight DRM (LWDRM) System, Proceedings of the 2004 workshop on Multimedia and security MM&Sec’04, pp.93-99,, ACM Press, 2004.
  12. Yiliang Han, Xiaoyuan Yang and Yupu Hu, Signcryption Based on Elliptic Curve and Its Multi-Party Schemes, Proceedings of the 3rd international conference on Information security InfoSecu’04, pp.216-217, ACM Press, 2004.
  13. Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonzalez Nieto, Tripartite Key Exchange in the Canetti-Krawczyk Proof Model, 5th International Conference on Cryptology in India (INDOCRYPT 2004), Lecture Notes in Computer Science, Volume 3348, pp.17-32, Springer-Verlag, December 2004.
  14. Xiangxue Li and Kefei Chen, Identity Based Proxy-Signcryption Scheme from Pairings, 2004 IEEE International Conference on Services Computing (SCC’04), pp. 494-497, 2004.
  15. Beno t Libert and Jean-Jacques Quisquater, Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups, Public Key Cryptography (PKC ’04), LNCS 2947, pp. 187-200, Springer-Verlag, 2004.
  16. Beno t Libert and Jean-Jacques Quisquater, Improved Signcryption from q-Diffie-Hellman Problems, Security in Communication Networks (SCN ’04), LNCS 3352, pp. 220-234, Springer-Verlag, 2005.
  17. Beno t Libert and Jean-Jacques Quisquater, The Exact Security of an Identity Based Signature and its Applications, Cryptology ePrint Archive Report 2004/102.
  18. Noel McCullagh and Paulo S. L. M. Barreto, Efficient and Forward-Secure Identity-Based Signcryption, Cryptology ePrint Archive Report 2004/117.
  19. Bok-Nyong Park, Jihoon Myung and Wonjun Lee, ISSRP: A Secure Routing Protocol Using Identity-Based Signcryption Scheme in Ad-Hoc Networks, Parallel and Distributed Computing: Applications and Technologies, LNCS, V.3320, pp.711-714, Springer Verlag, 2004.
  20. Zuhua Shao, Cryptanalysis of Publicly Verifiable Authenticated Encryption, Proceedings of the 3rd international conference on Information security InfoSecu’04, pp.143-145, ACM Press, 2004.
  21. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai, Unconditionally Secure Authenticated Encryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol.E87-A, No.5, pp.1119-1131, 2004.
  22. S.F. Tzeng and S.M. Yen, Provably Secure Signcryption Scheme Based on RSA Cryptosystem, (received the Best Student Paper Award) Proc. of the ISC 2004 (Information Security Conference 2004), pp. 1-8, Taiwan, June 2004.
  23. G. Wang, F. Bao, C. Ma, and K. Chen, Efficient Authenticated Encryption Schemes with Public Verifiability, IEEE Vehicular Technology Conference (VTC 2004) – Wireless Technologies for Global Security. pp.3258-3261, Vol.5, IEEE Computer Society, 2004.
  24. Guilin Wang, Robert H. Deng, Dongjin Kwak, and Sangjae Moon, Security Analysis of Two Signcryption Schemes, Information Security (ISC 2004), LNCS 3225, pp. 123-133. Springer-Verlag, 2004.
  25. Yan Wang and Tieyan Li, LITESET/A++: A New Agent-Assisted Secure Payment Protocol, Proceedings of the IEEE International Conference on E-Commerce Technology (CEC’04), pp.244-251, Publisher: IEEE Computer Society, July 2004.
  26. T. H. Yuen and V. K. Wei, Fast and Proven Secure Blind Identity-Based Signcryption from Pairings, Cryptology ePrint Archive Report 2004/121.
2005
  1. Michel Abdalla, Jan Camenisch et al, New Technical Trends in Asymmetric Cryptography, ECRYPT (Network of Excellence in Cryptology), AZTEC Report, D.AZTEC.3, June 2005.
  2. Andr Adelsbach, Ulrich Huber and Ahmad-Reza Sadeghi, Secure Software Delivery and Installation in Embedded Systems, In: K. Lemke, C. Paar and M. Wolf (eds.): Embedded Security in Cars: Securing Current and Future Automotive IT Applications, pp. 27-49, Springer-Verlag. 2005.
  3. Amit K Awasthi, An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption, arXiv:cs.CR/0504095, April 23, 2005.
  4. O. Bamasak, N. Zhang, and D. Edwards, DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Scheme, Proceedings of 19th IEEE InternationalParallel and Distributed Processing Symposium, 4-8 April 2005.
  5. Paulo S. L. M. Barreto, Beno t Libert, Noel McCullagh and Jean-Jacques Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps, Asicrypto’05, LNCS 3788, pp. 515-532, Springler-Verlag, 2005.
  6. L. Chen, J. Malone-Lee, Improved Identity-Based Signcryption, Public Key Cryptography (PKC 2005), LNCS 3386, pp. 362-379, Springer-Verlag, 2005. (Full version Cryptology ePrint Archive, Report 2004/114).
  7. S. S. M. Chow, T. H. Yuen, L. C. K. Hui and S. M. Yiu, Signcryption in Hierarchical Identity Based Cryptosystem, Security and Privacy in the Age of Ubiquitous Computing (IFIP/ SEC 2005), pp. 443-457. Springer-Verlag, 2005.
  8. Alexander W. Dent, Hybrid Signcryption Schemes With Outsider Security, Information Security — ISC 2005, Springer-Verlag, LNCS, Vol.3650, pp. 203–217, 2005.
    Download the presentation slides.
  9. Alexander W. Dent, Hybrid Signcryption Schemes With Insider Security, Information Security and Privacy — ACISP 2005, Springer-Verlag, LNCS, Vol.3574, pp. 253–266, 2005.
    Download the presentation slides.
  10. Yevgeniy Dodis, Signcryption (a short survey), Encyclopedia of Cryptography and Security (updated version), 2005.
  11. Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, Identity-based Ring Signcryption Schemes, Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World, Proc. of The First International Workshop on Ubiquitous Smart Worlds (USW2005), in conjunction with the 19th IEEE International Conference of AINA2005, IEEE Computer Society, 2005, pp.649-654.
  12. Ren-Junn Hwang, Chih-Hua Lai and Feng-Fu Su, An Efficient Signcryption Scheme With Forward Secrecy Based on Elliptic Curve, Applied Mathematics and Computation, pp.870-881, V.167, No.2, Elsevier Inc., New Yor, 2005.
  13. Xiangxue Li, Kefei Chen and Shiqun Li, Cryptanalysis and Improvement of Signcryption Schemes on Elliptic Curves, Wuhan University Journal of Natural Science. Vol.10, No.1 2005.
  14. Jun-Bao Liu and Guo-Zhen Xiao, Multi-Proxy Multi-Signcryption Scheme from Pairings, arxiv.org/abs/cs.CR/0509030, Sept 2005.
  15. Changshe Ma, Kefei Chen, Dong Zheng and Shengli Liu, Efficient and Proactive Threshold Signcryption, Information Security — ISC 2005, Springer-Verlag, LNCS, Vol.3650, pp. 233-243, 2005.
  16. John Malone-Lee, Signcryption with Non-interactive Non-repudiation, Designs, Codes and Cryptography, Volume 37, Number 1, pp.81 – 109 October 2005. Also appeared as Technical Report CSTR-02-004, Department of Computer Science, University of Bristol, May 2004.
  17. D. Nali, C. Adams and A. Miri, Hierarchical Identity-Based Signcryption with Public Ciphertext Authenticity and Forward Security, Presented at the Western European Workshop on Research in Cryptology (WEWoRC), Leuven-Heverlee, Belgium, July 5-7, 2005.
  18. Bok-Nyong Park and Wonjun Lee, ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks, IEICE Transations on Comunications, Vol.E88-B, No.66, pp.2548-2565, June 2005.
  19. Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim and Dongho Won, XML-Based Digital Signature Accelerator in Open Mobile Grid Computing, 4th International Conference on Grid and Cooperative Computing – GCC 2005, LNCS, Springer-Verlag, Vol. 3795, pp.323-333, 2005.
  20. Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won and Yuliang Zheng, A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services, Proceedings of the 5th International Conference on Web Engineering (ICWE 2005), Sydney, Australia, July 27-29, 2005, LNCS Vol. 3579, pp. 91-196, Springer-Verlag. Editors: David Lowe, Martin Gaedke.
  21. Changgen Peng and Xiang Li, Threshold Signcryption Scheme Based on Elliptic Curve Cryptosystem and Verifiable Secret Sharing, Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Vol.2, pp.1182-1185, 23-26 Sept. 2005.
  22. Chik-How Tan, On the Security of Signcryption Scheme with Key Privacy, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E88-A, Issue 4, Pages 1093 – 1095, 2005
  23. Guomin Yang, Duncan S. Wong and Xiaotie Deng, Analysis and Improvement of a Signcryption Scheme with Key Privacy, Information Security — ISC 2005, Springer-Verlag, LNCS, Vol.3650, pp. 218-232, 2005.
  24. T Yuen and V. K. Wei, Fast and Proven Secure Blind Identity-Based Signcryption from Pairings, Topics in Cryptology – CT-RSA 2005, LNCS 3376, pp. 305-322, Springer-Verlag, 2005. (Preliminary version appeared as Cryptology ePrint Archive Report 2004/121/. )
  25. T Yuen and V. K. Wei, Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles, Cryptology ePrint Archive Report 2005/412.
  26. Yan Wang and Vijay Varadharajan, A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments, Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT’05), Pages: 88-94, EEE Computer Society, September 2005.
  27. Meng Wang and Zhijing Liu, Identity Based Threshold Proxy Signcryption Scheme, The Fifth International Conference on Computer and Information Technology (CIT05), pp.695-699, 21-23 Sept. 2005.
  28. Tzong-Sun Wu and Chien-Lung Hsu, Convertible Authenticated Encryption Scheme, Journal of Systems and Software Volume 62, Issue 3 , 15 June 2002, Pages 205-209, Elsevier Science.
  29. Fangguo Zhang, Yi Mu and Willy Susilo, Reducing Security Overhead for Mobile Networks, 19th International Conference on Advanced Information Networking and Applications(AINA’05), Volume 1 (AINA papers), pp. 398-403, 2005.
2006
  1. St phanie Alt, Authenticated Hybrid Encryption for Multiple Recipients, Cryptology ePrint Archive Report 2006/029.
  2. Suzana Andova, Kristian Gj steen, Lillian Kr kmo, Stig Frode Mj lsnes and Sa a Radomirovic, An Example of Proving Uc-Realization with Formal Methods, Workshop on Formal and Computational Cryptography (FCC 2006), Venice, Italy, July 2006.
  3. Giuseppe Ateniese, Kevin Fu, Matthew Green and Susan Hohenberger, Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, ACM Transactions on Information and System Security (TISSEC), Volume 9, Issue 1, pp.1-30, 2006.
  4. Omaima Bamasak and Ning Zhang, Reputation Management and Signature Delegation: A Distributed Approach, Electronic Commerce Research, Volume 6 Issue 3-4, October 2006.
  5. Tor E. Bjorstad and Alexander W. Dent, Building Better Signcryption Schemes with Tag-KEMs, Public Key Cryptography (PKC 2006), LNCS 3958, pp. 491-507, Springer-Verlag, 2006.
  6. Yu Fang Chung, Zhen Yu Wu, Feipei Lai and Tzer-Shyong Chen, Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem, JCIS-2006 Proceedings, Advances in Intelligent Systems Research, 2006.
  7. Shanshan Duan and Zhenfu Cao: Efficient and Provably Secure Multi-receiver Identity-Based Signcryption, Information Security and Privacy — Proceedings of 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, LNCS, Vol.4058, pp.195-206, Springer 2006, ISBN 3-540-35458-1.
  8. Yiliang Han and Xiaoyuan Yang, ECGSC: Elliptic Curve based Generalized Signcryption Scheme, Cryptology ePrint Archive Report 2006/126.
  9. X.-Y. Huang, F.-T. Zhang and W. Wu, An Identity-Based Ring Signcryption Scheme, Acta Electronica Sinica, Vol 34, Part 2, pp.263-266, 2006.
  10. Pandurang Kamat, Arati Baliga and Wade Trappe, An Identity-Based Security Framework for VANETs, Proceedings of the 3rd international workshop on Vehicular ad hoc networks, International Conference on Mobile Computing and Networking, pp.94-95, Los Angeles, CA, USA, 2006.
  11. E-yong Kim, Klara Nahrstedt, Li Xiao and Kunsoo Park, Secure Routing and Firewall: Identity-Based Registry for Secure Interdomain Routing, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), pp.321-331, ACM Press, 2006.
  12. Rack-Hyun Kim and Heung-Youl Youm;, Secure Authenticated Key Exchange protocol based on EC using Signcryption Scheme 2006 International Conference on Hybrid Information Technology (ICHIT’06), Volume 2, Page(s):74-79, Nov. 2006.
  13. DongJin Kwak, SangJae Moon, Guilin Wang and Rorbert H. Deng, A Secure Extension of the Kwak Moon Group Signcryption Scheme, Computers & Security Volume 25, Issue 6 , September 2006, Pages 435-444.
  14. Jong-Ho Ryu, Youn-Seo Jeong and Dong-il Seo, Identity Based KCDSA Signcryption, Advanced Communication Technology 2006 (ICACT 2006), Vol.2, 20-22 Feb. 2006. ISBN: 89-5519-129-4.
  15. S. Kim, D. Won, K. Kim and J. Jung, An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI, Third European PKI Workshop: theory and practice (EuroPKI 2006), Torino, Italy, June 19-20, 2006.
  16. Fagen Li, Xiangjun Xin and Yupu Hu, ID-Based Signcryption Scheme with (t, n) Shared Unsigncryption, International Journal of Network Security, Vol.3, No.1, pp.64 68, July 2006.
  17. Chik-How Tan, Analysis of Improved Signcryption Scheme with Key Privacy, Information Processing Letters, Volume 99, Pages 135 – 138, 2006.
  18. Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan and Yu Yu, FPGA based DPA-resistant Unified Architecture for Signcryption, Third International Conference on Information Technology: New Generations (ITNG’06), pp.571-572, 2006.
  19. Chik-How Tan, Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A(1), pp.206-208, 2006.
  20. Attila Altay Yavuz, Fatih Alagoz and Emin Anarim, NAMEPS: N-tier Satellite Multicast Security Protocol Based on Signcryption Schemes, IEEE GLOBECOM2006.
  21. Attila Altay Yavuz, Fatih Alagoz and Emin Anarim, HIMUTSIS: Hierarchical Multi-Tier Adaptive Ad-hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes, ISCIS 2006 21st Intl. Symposium on Computer and Information Sciences.
  22. Xin-Chun Yin, Jue-Wei Chen and Cai-Mei Wang, A New Forward-Secure Signcryption Scheme, Proceedings of 2006 International Conference on Communications, Circuits and Systems, Volume 3, Page 1615-1617, June 2006
  23. Maki Yoshida and Toru Fujiwara, On the Security of Tag-KEM for Signcryption, Electronic Notes in Theoretical Computer Science, Volume 171, Issue 1, 14 April 2007, Pages 83-91, Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks (WCAN 2006).
  24. C.-R. Zhang and G.-Z. Xiao, Cryptanalysis and Improvement of a Signcryption Scheme with Public Verifiability, Acta Electronica Sinica, Vol 34; Part 1, pp.177-179, 2006.
2007
  1. Joonsang Baek, Ron Steinfeld and Yuliang Zheng, Formal Proofs for the Security of Signcryption, Journal of Cryptology, Vol. 20, Issue 2, pp.203-235, April 2007.
  2. Wen Chen and Feiyu Lei, An Efficient Multi-sender Identity Based Threshold Signcryption with Public Verifiability, Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.149-150, IEEE Computer Society, 2007.
  3. Hassan M. Elkamchouchi, Abdel-aty M. Emarah and Esam A. A. Hagras, Public Key Multi-Message Signcryption (PK-MMS) Scheme For Secure Communication Systems, Fifth Annual Conference on Communication Networks and Services Research (CNSR2007), pp. 329-334, Fredericton, New Brunswick, Canada May 14 – 17, IEEE Computer Society 2007.
  4. M. Choudary Gorantla, Colin Boyd and Juan Manuel Gonzalez Nieto, On the Connection Between Signcryption and One-pass Key Establishment, In Galbraith, Steven, Eds. Proceedings The 11th IMA International Conference on Cryptography and Coding, Cirencester, UK. LNCS 4887, pp. 1-24, Cirencester, UK. 2007.
  5. Kristian Gj steen and Lillian Kr kmo, Universally Composable Signcryption, Proceedings of EuroPKI 2007, LNCS, volume 4582, pages 346-353.
  6. I. Gupta, N.R. Pillai, and P.K. Saxena, Distributed Signcryption Scheme on Hyperelliptic Curve, Proceeding of Communication, Network, and Information Security (CNIS 2007).
  7. Yiliang Han, Generalization of Signcryption for Resources-Constrained Environments, Wireless Communications and Mobile Computing Volume 7, Issue 7, pp 919-931, 2007, John Wiley & Sons, Ltd.
  8. Sunder Lal and Tej Singh, New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings, arXiv.org > cs > cs/0701044, January 2007.
  9. Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng and Sherman S. M. Chow, An Efficient Signcryption Scheme with Key Privacy, Proceedings of 4th European PKI Workshop – Theory and Practice (EuroPKI 2007), LNCS 4582, pp78-93, Springer-Verlag, 2007.
  10. S. Narayan and P. Udaya, A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps, Proceedings of SECRYPT 2007, International Conference on Security and Cryptography, July 28-31, Barcelona, Spain, 2007.
  11. F. Li, X. Xin, and Y. Hu, A Pairing-Based Signcryption Scheme Using Self-Certified Public Keys, International Journal of Computers and Applications, Vol.29, Issue 3, pp.2086-2093, 2007.
  12. Chik-How Tan, Forgery of Provable Secure Short Signcryption Scheme, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A(9), pp.1879-1880, 2007.
  13. Zhong Xu, Guanzhong Dai, Deming Yang, An Efficient Online/Offline Signcryption Scheme for MANET, The Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-07), pp.171-176, IEEE Computer Society, 2007.

UAB the University of Alabama at Birmingham home
UAB is an Equal Opportunity/Affirmative Action Employer committed to fostering a diverse, equitable and family-friendly environment in which all faculty and staff can excel and achieve work/life balance irrespective of race, national origin, age, genetic or family medical history, gender, faith, gender identity and expression as well as sexual orientation. UAB also encourages applications from individuals with disabilities and veterans.