Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function
Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency. There are numerous approaches described in the literature that can be used to generate these cancelable templates.
Vani Rajasekar +5 more
openaire +2 more sources
An efficient FIS and RSA based Signcryption Security Scheme [PDF]
No ...
, Shailee Namdev, Prof. Piyush Singh
core +2 more sources
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
Generic Constructions for Verifiable Signcryption [PDF]
Signcryption is a primitive which simultaneously performs the functions of both signature and encryption in a way that is more efficient than signing and encrypting separately. We study in this paper constructions of signcryption schemes from basic cryptographic mechanisms; our study concludes that the known constructions require expensive encryption ...
openaire +1 more source
Ensuring Security and Privacy in VANET: A Comprehensive Survey of Authentication Approaches
Vehicular ad hoc networks (VANET) are revolutionizing intelligent transportation systems (ITS), and as a result, research on their security is becoming increasingly important. As the primary security concern for VANET, authentication security is still quite difficult to achieve.
Soujanya B K +2 more
wiley +1 more source
An Identity based Multi-receiver Generalized Signcryption Scheme
Generalized signcryption can adaptively work as a signcryption scheme, a signature scheme or an encryption scheme jointly with only one algorithm. It is very suitable for the storage constrained environments, like smart card, the embedded system and wireless sensor networks.
Tej Singh, Rashid Ali
openaire +2 more sources
A New Pairing-Free Certificateless Signcryption Scheme [PDF]
Signcryption is a cryptographic primitive which provides unforgeability and confidentiality for digital communications. Many signcryption schemes have been constructed in the literature for secure communication between smart objects.
Amarapu, Ramesh Babu +3 more
core +2 more sources
Identity Based Generalized Proxy Signcryption Scheme
Generalized signcryption can work as an encryption scheme, a signature scheme or a signcryption scheme with only one keypair and one algorithm. We extend it to the proxy system setting by considering sharing the same keypair and algorithm between the proxy signature and proxy signcryption, and we call it generalized proxy signcryption (GPSC).
openaire +1 more source
Contributions to secret sharing and other distributed cryptosystems [PDF]
The present thesis deals with primitives related to the eld of distributed cryptography. First, we study signcryption schemes, which provide at the same time the functionalities of encryption and signature, where the unsigncryption operation is ...
Ruiz Rodriguez, Alexandre
core +3 more sources
Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields [PDF]
In this paper, we cryptanalyzed a recently proposed encryption scheme that uses elliptic curve over a finite field. The security of proposed scheme depends upon elliptic curve discrete logarithm problem.
Malik Zia, Rashid Ali
core +2 more sources

