Results 51 to 60 of about 423 (151)

Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function

open access: yesAxioms, 2022
Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency. There are numerous approaches described in the literature that can be used to generate these cancelable templates.
Vani Rajasekar   +5 more
openaire   +2 more sources

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Generic Constructions for Verifiable Signcryption [PDF]

open access: yes, 2012
Signcryption is a primitive which simultaneously performs the functions of both signature and encryption in a way that is more efficient than signing and encrypting separately. We study in this paper constructions of signcryption schemes from basic cryptographic mechanisms; our study concludes that the known constructions require expensive encryption ...
openaire   +1 more source

Ensuring Security and Privacy in VANET: A Comprehensive Survey of Authentication Approaches

open access: yesJournal of Computer Networks and Communications, Volume 2024, Issue 1, 2024.
Vehicular ad hoc networks (VANET) are revolutionizing intelligent transportation systems (ITS), and as a result, research on their security is becoming increasingly important. As the primary security concern for VANET, authentication security is still quite difficult to achieve.
Soujanya B K   +2 more
wiley   +1 more source

An Identity based Multi-receiver Generalized Signcryption Scheme

open access: yesAsian Journal of Applied Sciences, 2018
Generalized signcryption can adaptively work as a signcryption scheme, a signature scheme or an encryption scheme jointly with only one algorithm. It is very suitable for the storage constrained environments, like smart card, the embedded system and wireless sensor networks.
Tej Singh, Rashid Ali
openaire   +2 more sources

A New Pairing-Free Certificateless Signcryption Scheme [PDF]

open access: yes, 2022
Signcryption is a cryptographic primitive which provides unforgeability and confidentiality for digital communications. Many signcryption schemes have been constructed in the literature for secure communication between smart objects.
Amarapu, Ramesh Babu   +3 more
core   +2 more sources

Identity Based Generalized Proxy Signcryption Scheme

open access: yesInformation Technology and Control, 2016
Generalized signcryption can work as an encryption scheme, a signature scheme or a signcryption scheme with only one keypair and one algorithm. We extend it to the proxy system setting by considering sharing the same keypair and algorithm between the proxy signature and proxy signcryption, and we call it generalized proxy signcryption (GPSC).
openaire   +1 more source

Contributions to secret sharing and other distributed cryptosystems [PDF]

open access: yes, 2013
The present thesis deals with primitives related to the eld of distributed cryptography. First, we study signcryption schemes, which provide at the same time the functionalities of encryption and signature, where the unsigncryption operation is ...
Ruiz Rodriguez, Alexandre
core   +3 more sources

Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields [PDF]

open access: yes, 2021
In this paper, we cryptanalyzed a recently proposed encryption scheme that uses elliptic curve over a finite field. The security of proposed scheme depends upon elliptic curve discrete logarithm problem.
Malik Zia, Rashid Ali
core   +2 more sources

Home - About - Disclaimer - Privacy