Sign Up to like & get
recommendations!
0
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-016-3554-8
Abstract: Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the…
read more here.
Keywords:
security model;
standard model;
model;
certificateless signcryption ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3281612
Abstract: Signature can be used to verify the integrity of both a message and the identity of a signer, whereas encryption can be used to ensure the confidentiality of a message. In the past, cryptography researchers…
read more here.
Keywords:
leakage model;
certificateless signcryption;
leakage;
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2020.3007519
Abstract: Certificateless signcryption can simultaneously provide certificateless signature and encryption. In recent years, many certificateless signcryption schemes have been proposed. However, these schemes are based on traditional mathematical theory and not have the ability of resisting…
read more here.
Keywords:
certificateless signcryption;
signcryption scheme;
scheme lattice;
certificateless ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2022.3230442
Abstract: The emergence of the vehicular ad-hoc network (VANETs) could meet the need for an efficient and safe transportation. Vehicles wirelessly interact with nearby road-side units (RSUs) and send the data to the cloud servers (CS),…
read more here.
Keywords:
certificateless signcryption;
signcryption;
encryption;
edge computing ... See more keywords