Sign Up to like & get
recommendations!
0
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-016-3554-8
Abstract: Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the…
read more here.
Keywords:
security model;
standard model;
model;
certificateless signcryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-02076-x
Abstract: This paper presents a novel secure and privacy-preserving scheme for enhancing the security of transmitted data in an Internet of Things (IoT) environment. The proposed scheme combines a short group signature scheme with a signcryption…
read more here.
Keywords:
group;
security;
scheme;
transmitted data ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Scientific Reports"
DOI: 10.1038/s41598-024-77992-5
Abstract: Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs). In existing certificateless anonymous signcryption schemes…
read more here.
Keywords:
scheme;
certificateless anonymous;
anonymous signcryption;
signcryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-025-24687-0
Abstract: The Internet of Medical Things (IoMT) plays a crucial role in enabling precision diagnosis and optimal recommendations for patients monitored remotely. However, conventional encryption–signature mechanisms introduce significant computational and communication overhead, making them unsuitable for…
read more here.
Keywords:
scheme;
medical things;
lightweight signcryption;
signcryption scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Electronics Letters"
DOI: 10.1049/el.2019.0032
Abstract: Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems. A number…
read more here.
Keywords:
signcryption scheme;
blind signcryption;
based elliptic;
signcryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2884798
Abstract: Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time-consuming operation, which makes…
read more here.
Keywords:
certificateless multi;
signcryption;
multi receiver;
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2935788
Abstract: Elliptic curve cryptosystem (ECC) has the merits of providing shorter key length and higher processing speed compared with other public key cryptosystems with respect to the same security level. In addition, blind signcryption is widely…
read more here.
Keywords:
signcryption low;
low complexity;
certificateless blind;
blind signcryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3069429
Abstract: The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based security protocols…
read more here.
Keywords:
rfid;
curve;
scheme;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3165565
Abstract: In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more…
read more here.
Keywords:
provably secure;
signcryption;
group;
fractional chaotic ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3210265
Abstract: A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both multi-recipient public-key encryption and digital signature to ensure both integrity and confidentiality of transmitted messages. Moreover, an anonymous MRSC (AMRSC) scheme retains the functionalities of…
read more here.
Keywords:
signcryption;
inline formula;
leakage;
tex math ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3211257
Abstract: The Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for the IIoT offers a thorough comprehension of the whole…
read more here.
Keywords:
communication;
signcryption;
industrial internet;
security ... See more keywords