{"title":"Certificateless Proxy Signcryption Using Cyclic Multiplication Groups","authors":"Hui-fang Yu","doi":"10.1109/CIS2018.2018.00101","DOIUrl":null,"url":null,"abstract":"Proxy signcryption is that the proxy signcrypter obtains the delegate authorization from the original signcrypter, and then signcrypts the specified message on behalf of the original signcrypter. In this paper, the author constructs a novel certificateless proxy signcryption scheme based on three cyclic multiplication groups and its security bases on the intractability of the co-bilinear Diffie-Hellman (co-BDH) and co-computational Diffie-Hellman (co-CDH) problems. Our certificateless proxy signcryption scheme is very appropriate for applications in electric commerce and electric government.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 14th International Conference on Computational Intelligence and Security (CIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS2018.2018.00101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Proxy signcryption is that the proxy signcrypter obtains the delegate authorization from the original signcrypter, and then signcrypts the specified message on behalf of the original signcrypter. In this paper, the author constructs a novel certificateless proxy signcryption scheme based on three cyclic multiplication groups and its security bases on the intractability of the co-bilinear Diffie-Hellman (co-BDH) and co-computational Diffie-Hellman (co-CDH) problems. Our certificateless proxy signcryption scheme is very appropriate for applications in electric commerce and electric government.