Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3148038
Abstract: As we all know, the random oracle model (ROM) is a simulation of the hash function and cannot replace the actual computation of hash function and the public-key cryptography scheme, which was proved to be…
read more here.
Keywords:
proxy signcryption;
certificateless proxy;
security;
clpsc scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2015-0014
Abstract: Abstract We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender…
read more here.
Keywords:
signcryption schemes;
sender;
anonymous proxy;
proxy signcryption ... See more keywords