Articles with "proxy signcryption" as a keyword



Photo by scottwebb from unsplash

Certificateless Proxy Signcryption in the Standard Model for a UAV Network

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3148038

Abstract: As we all know, the random oracle model (ROM) is a simulation of the hash function and cannot replace the actual computation of hash function and the public-key cryptography scheme, which was proved to be… read more here.

Keywords: proxy signcryption; certificateless proxy; security; clpsc scheme ... See more keywords
Photo by anniespratt from unsplash

A secure anonymous proxy signcryption scheme

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2015-0014

Abstract: Abstract We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender… read more here.

Keywords: signcryption schemes; sender; anonymous proxy; proxy signcryption ... See more keywords