Results 131 to 140 of about 423 (151)
Some of the next articles are maybe not open access.
GSEP: an E-Mail Protocol Based on Generalized Signcryption
Applied Mechanics and Materials, 2013The security in e-mail protocol has received significant research attention. In this paper, an e-mail protocol, GSEP, using improved generalized signcryption scheme is proposed. GSEP can send private e-mail, public e-mail safely, and using key trace to solve the problem of key escrowing, using identity authentication to solve the problem of junk e-mail.
openaire +1 more source
Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010Generalized signcryption is a new cryptographic primitive which is more useful than the common signcryption in some applications. In this paper, based on a short ECDSA, a sescure and efficient generalized signcryption scheme is proposed. It can work as the same with the original generalized signcryption scheme ECGSC and provides message confidentiality,
Chuanrong Zhang, Long Chi, Yuqing Zhang
openaire +1 more source
Operative Access Regulator for Attribute Based Generalized Signcryption Using Rough Set Theory
2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), 2020The personal health record has been shared and preserved easily with cloud core storage. Privacy and security have been one of the main demerits of core CloudHealthData storage. By increasing the security concerns in this paper experimented Operative Access Regulator for Attribute Based Generalized Signcryption Using rough set theory.
J. Priyanka +2 more
openaire +1 more source
Provably Secure and Efficient Multi-receiver Identity-Based Generalized Signcryption Scheme
2014 Ninth Asia Joint Conference on Information Security, 2014Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm and one key pair, which is very suitable for storage-constrained environments, like the embedded systems, smart cards and wireless sensor networks.
openaire +1 more source
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits
2016In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates ...
Fei Chen +4 more
openaire +1 more source
Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 2022Liang Zhang +3 more
openaire +1 more source
Formal Security Proof for Generalized Signcryption
2009 International Conference on E-Business and Information System Security, 2009Jindan Zhang, Xu an Wang
openaire +1 more source
Certificateless Generalized Signcryption Scheme without Random Oracles
Journal of Software, 2012Lian-Dong LIU +3 more
openaire +1 more source

