Articles with "signcryption" as a keyword



Certificateless Signcryption in the Standard Model

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3554-8

Abstract: Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the… read more here.

Keywords: security model; standard model; model; certificateless signcryption ... See more keywords

An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-02076-x

Abstract: This paper presents a novel secure and privacy-preserving scheme for enhancing the security of transmitted data in an Internet of Things (IoT) environment. The proposed scheme combines a short group signature scheme with a signcryption… read more here.

Keywords: group; security; scheme; transmitted data ... See more keywords

An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network

Sign Up to like & get
recommendations!
Published in 2024 at "Scientific Reports"

DOI: 10.1038/s41598-024-77992-5

Abstract: Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs). In existing certificateless anonymous signcryption schemes… read more here.

Keywords: scheme; certificateless anonymous; anonymous signcryption; signcryption ... See more keywords

Lightweight signcryption scheme for Securing wearable sensor observed health data sharing in internet of medical things paradigm

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-24687-0

Abstract: The Internet of Medical Things (IoMT) plays a crucial role in enabling precision diagnosis and optimal recommendations for patients monitored remotely. However, conventional encryption–signature mechanisms introduce significant computational and communication overhead, making them unsuitable for… read more here.

Keywords: scheme; medical things; lightweight signcryption; signcryption scheme ... See more keywords

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

Sign Up to like & get
recommendations!
Published in 2019 at "Electronics Letters"

DOI: 10.1049/el.2019.0032

Abstract: Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems. A number… read more here.

Keywords: signcryption scheme; blind signcryption; based elliptic; signcryption ... See more keywords

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2884798

Abstract: Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time-consuming operation, which makes… read more here.

Keywords: certificateless multi; signcryption; multi receiver;

Certificateless Blind Signcryption With Low Complexity

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2935788

Abstract: Elliptic curve cryptosystem (ECC) has the merits of providing shorter key length and higher processing speed compared with other public key cryptosystems with respect to the same security level. In addition, blind signcryption is widely… read more here.

Keywords: signcryption low; low complexity; certificateless blind; blind signcryption ... See more keywords

RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3069429

Abstract: The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based security protocols… read more here.

Keywords: rfid; curve; scheme; security ... See more keywords

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3165565

Abstract: In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more… read more here.

Keywords: provably secure; signcryption; group; fractional chaotic ... See more keywords

Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3210265

Abstract: A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both multi-recipient public-key encryption and digital signature to ensure both integrity and confidentiality of transmitted messages. Moreover, an anonymous MRSC (AMRSC) scheme retains the functionalities of… read more here.

Keywords: signcryption; inline formula; leakage; tex math ... See more keywords

Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3211257

Abstract: The Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for the IIoT offers a thorough comprehension of the whole… read more here.

Keywords: communication; signcryption; industrial internet; security ... See more keywords