Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline +2 more
core +2 more sources
Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline +2 more
core +3 more sources
An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home [PDF]
publishedVersio
Alabrah, Amerah +6 more
core +1 more source
On the joint security of signature and encryption schemes under randomness reuse: efficiency and security amplification [PDF]
Lecture Notes in Computer Science, 7341We extend the work of Bellare, Boldyreva and Staddon on the systematic analysis of randomness reuse to construct multi-recipient encryption schemes to the case where randomness is reused across different ...
C.H. Tan +13 more
core +3 more sources
Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols [PDF]
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and ...
Gao, Fei +3 more
core +1 more source
Generalized Hierarchical Identity-Based Signcryption
In this paper, we propose a generic method to construct Hierarchical Identity-Based Signcryption scheme. Using this method, a Hierarchical Identity-Based Signcryption scheme can be converted from any Hierarchical Identity-Based Encryption scheme. Then, we give a concrete instantiation, which is the first constant-size fully secure hierarchical identity-
Hao Wang, Qiuliang Xu, Xiufeng Zhao
openaire +1 more source
Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications, 2020
Wireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022.
Fawad Zaman +4 more
wiley +1 more source
Distributed Secure Computing for Smart Mobile IoT Networks
Mobile Information Systems, Volume 2022, Issue 1, 2022.
Vishal Sharma +5 more
wiley +1 more source
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources. [PDF]
Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators, and networking capabilities are becoming part of many solutions that seek to enhance user's environment smartness and quality of living, prominently including ...
Askoxylakis Ioannis G.() +5 more
core +1 more source
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi +3 more
core +1 more source

