Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 702539, 18 pages
Research Article

Efficient Lattice-Based Signcryption in Standard Model

1State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2School of Information and Electric Engineering, Ludong University, Yantai 264025, China
3Network Security Research Institute, National Institute of Information and Communications Technology, 4-2-1 Nukui-Kitamachi, Koganei-shi, Tokyo 184-8795, Japan

Received 25 June 2013; Revised 26 August 2013; Accepted 27 August 2013

Academic Editor: Wang Xing-yuan

Copyright © 2013 Jianhua Yan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [5 citations]

The following is the list of published articles that have cited the current article.

  • Licheng Wang, Chunli Yang, Xiuhua Lu, Qiaoyan Wen, and Zhengping Jin, “A lattice-based signcryption scheme without random oracles,” Frontiers of Computer Science, vol. 8, no. 4, pp. 667–675, 2014. View at Publisher · View at Google Scholar
  • Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, and Wenbin Yao, “Identity-based signcryption from lattices,” Security and Communication Networks, 2015. View at Publisher · View at Google Scholar
  • Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, and Junwei Wen, “A post-quantum communication secure identity-based proxy-signcryption scheme,” International Journal of Electronic Security and Digital Forensics, vol. 7, no. 2, pp. 147–165, 2015. View at Publisher · View at Google Scholar
  • Qiaoyan Wen, Licheng Wang, Xiuhua Lu, and Jiao Du, “A lattice-based signcryption scheme without trapdoors,” Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, vol. 38, no. 9, pp. 2287–2293, 2016. View at Publisher · View at Google Scholar
  • Jianhua Yan, Licheng Wang, Jing Li, Muzi Li, Yixan Yang, and Wenbin Yao, “Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature,” Concurrency and Computation: Practice and Experience, 2016. View at Publisher · View at Google Scholar