Results 131 to 140 of about 423 (151)
Some of the next articles are maybe not open access.

GSEP: an E-Mail Protocol Based on Generalized Signcryption

Applied Mechanics and Materials, 2013
The security in e-mail protocol has received significant research attention. In this paper, an e-mail protocol, GSEP, using improved generalized signcryption scheme is proposed. GSEP can send private e-mail, public e-mail safely, and using key trace to solve the problem of key escrowing, using identity authentication to solve the problem of junk e-mail.
openaire   +1 more source

Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA

2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010
Generalized signcryption is a new cryptographic primitive which is more useful than the common signcryption in some applications. In this paper, based on a short ECDSA, a sescure and efficient generalized signcryption scheme is proposed. It can work as the same with the original generalized signcryption scheme ECGSC and provides message confidentiality,
Chuanrong Zhang, Long Chi, Yuqing Zhang
openaire   +1 more source

Operative Access Regulator for Attribute Based Generalized Signcryption Using Rough Set Theory

2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), 2020
The personal health record has been shared and preserved easily with cloud core storage. Privacy and security have been one of the main demerits of core CloudHealthData storage. By increasing the security concerns in this paper experimented Operative Access Regulator for Attribute Based Generalized Signcryption Using rough set theory.
J. Priyanka   +2 more
openaire   +1 more source

Provably Secure and Efficient Multi-receiver Identity-Based Generalized Signcryption Scheme

2014 Ninth Asia Joint Conference on Information Security, 2014
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm and one key pair, which is very suitable for storage-constrained environments, like the embedded systems, smart cards and wireless sensor networks.
openaire   +1 more source

Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits

2016
In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates ...
Fei Chen   +4 more
openaire   +1 more source

Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption

Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 2022
Liang Zhang   +3 more
openaire   +1 more source

Formal Security Proof for Generalized Signcryption

2009 International Conference on E-Business and Information System Security, 2009
Jindan Zhang, Xu an Wang
openaire   +1 more source

A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)

Journal of Information Security and Applications, 2021
Saddam Hussain   +2 more
exaly  

Certificateless Generalized Signcryption Scheme without Random Oracles

Journal of Software, 2012
Lian-Dong LIU   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy