Results 131 to 140 of about 1,315,010 (177)
Some of the next articles are maybe not open access.

Identity-based threshold ring signcryption from pairing

International Journal of Electronic Security and Digital Forensics, 2014
This paper presents an identity-based threshold ring signcryption scheme. With this technique, any group of t entities can choose n - t entities to generate a t-out-of-n signcryption on behalf of the group of n members, yet the actual signcrypters remain anonymous. The scheme is proven to be indistinguishable against adaptive chosen ciphertext attacks,
Lunzhi Deng, Siwei Li, Yafeng Yu
openaire   +3 more sources

A new identity-based ring signcryption scheme

International Journal of Electronic Security and Digital Forensics, 2014
This paper presents a new identity-based ring signcryption scheme. With this technique, anyone can choose n − 1 entities to generate a verifiable ring signcryption on behalf of the group of n members, yet the actual signcrypter remain anonymous. The scheme is proven to be indistinguishable against adaptive chosen ciphertext attacks, existentially ...
Deng, Lunzhi, Zeng, Jiwen, Li, Siwei
openaire   +4 more sources

Ring signature scheme for ECC-based anonymous signcryption

Computer Standards & Interfaces, 2009
This study presents an elliptic curve cryptosystem-based signcryption scheme with anonymity features. The scheme possesses the properties of elliptic curve cryptosystem and ring signature. While the technique of ring signature endows the signers with anonymity, the elliptic curve cryptosystem provides advantages like high security, low computation load,
Yu Fang Chung   +2 more
openaire   +3 more sources

IDTRSC: ID-Based Traceable Ring Signcryption Framework for Data Sharing Without Key Escrow

IEEE Transactions on Vehicular Technology
The capability to share data across different entities is increasingly pronounced in our data-driven and centric society. However, we also have to ensure properties such as data confidentiality, unforgeability, anonymity and traceability are supported in
Jiannan Wei   +5 more
semanticscholar   +3 more sources

An Improved Identity-Based Ring Signcryption Scheme

Information Security Journal: A Global Perspective, 2013
In this paper, we show that the identity-based ring signcryption scheme suggested by Zhu, Zhang, and Wang 2009 does not reach the security as they claimed it does. To make up for this defect, we propose a rescue scheme and prove the revised scheme is secure under the random oracle model.
Lunzhi Deng   +2 more
openaire   +3 more sources

On the Security of Identity Based Ring Signcryption Schemes [PDF]

open access: yes, 2009
Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. Ring signcryption enables a user to signcrypt a message along with the identities of a set of potential senders (that includes him) without revealing which user in the set has ...
S. Sharmila Deva Selvi   +2 more
openaire   +3 more sources

An efficient and provable secure identity-based ring signcryption scheme

Computer Standards & Interfaces, 2009
ID-based ring signcryption schemes (IDRSC) are usually derived from bilinear parings, a powerful but computationally expensive primitive. The number of paring computations of all existing ID-based ring signcryption schemes from bilinear pairings grows linearly with group size, which makes the efficiency of ID-based schemes over traditional schemes ...
ZhenChao Zhu   +2 more
openaire   +3 more sources

Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme

Wireless Personal Communications, 2017
Recently, Sharma et al. (Wirel Pers Commun, 2015. doi: 10.1007/s11277-015-2698-2 ) proposed a pairing-free certificateless ring signcryption scheme (PF-CLRSC) and used it for the environment of wireless sensor networks. They claimed that their scheme was provably secure.
Han Shen   +3 more
openaire   +2 more sources

An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs

Journal of Systems Architecture, 2022
Rui-Fang Guo   +4 more
semanticscholar   +3 more sources

Efficient multi-receiver signcryption scheme based on ring signature

International Journal of Ad Hoc and Ubiquitous Computing, 2023
Yong Xie   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy