Articles with "signcryption" as a keyword



Photo from wikipedia

Certificateless Signcryption in the Standard Model

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3554-8

Abstract: Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the… read more here.

Keywords: security model; standard model; model; certificateless signcryption ... See more keywords
Photo by andrewtneel from unsplash

An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-02076-x

Abstract: This paper presents a novel secure and privacy-preserving scheme for enhancing the security of transmitted data in an Internet of Things (IoT) environment. The proposed scheme combines a short group signature scheme with a signcryption… read more here.

Keywords: group; security; scheme; transmitted data ... See more keywords
Photo by osarugue from unsplash

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

Sign Up to like & get
recommendations!
Published in 2019 at "Electronics Letters"

DOI: 10.1049/el.2019.0032

Abstract: Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems. A number… read more here.

Keywords: signcryption scheme; blind signcryption; based elliptic; signcryption ... See more keywords
Photo by chrismoore_ from unsplash

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2884798

Abstract: Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time-consuming operation, which makes… read more here.

Keywords: certificateless multi; signcryption; multi receiver;
Photo by lureofadventure from unsplash

Certificateless Blind Signcryption With Low Complexity

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2935788

Abstract: Elliptic curve cryptosystem (ECC) has the merits of providing shorter key length and higher processing speed compared with other public key cryptosystems with respect to the same security level. In addition, blind signcryption is widely… read more here.

Keywords: signcryption low; low complexity; certificateless blind; blind signcryption ... See more keywords
Photo by nathananderson from unsplash

RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3069429

Abstract: The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based security protocols… read more here.

Keywords: rfid; curve; scheme; security ... See more keywords
Photo by papaioannou_kostas from unsplash

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3165565

Abstract: In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more… read more here.

Keywords: provably secure; signcryption; group; fractional chaotic ... See more keywords
Photo by rainierridao from unsplash

Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3210265

Abstract: A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both multi-recipient public-key encryption and digital signature to ensure both integrity and confidentiality of transmitted messages. Moreover, an anonymous MRSC (AMRSC) scheme retains the functionalities of… read more here.

Keywords: signcryption; inline formula; leakage; tex math ... See more keywords
Photo by headwayio from unsplash

Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3211257

Abstract: The Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for the IIoT offers a thorough comprehension of the whole… read more here.

Keywords: communication; signcryption; industrial internet; security ... See more keywords
Photo by jessicaanne from unsplash

A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3167102

Abstract: During the past few years, as Internet of Things develops rapidly, the applications of unmanned aerial vehicle (UAV) technology have been increasingly widely used. Meanwhile, the efficiency and security issues of UAV communication have brought… read more here.

Keywords: unmanned aerial; signcryption; signcryption scheme; hsc u2g ... See more keywords
Photo by szolkin from unsplash

O³HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2022.3153485

Abstract: Wireless body area networks (WBAN) enable ubiquitous monitoring of patients, which can change the future of healthcare services overwhelmingly. As the collected data of patients usually contain sensitive information, how to collect, transfer, store and… read more here.

Keywords: signcryption; inline formula; online offline; tex math ... See more keywords