Results 11 to 20 of about 1,315,010 (177)

Analysis and improvement of authenticatable ring signcryption scheme [PDF]

open access: yesJournal of Shanghai Jiaotong University (Science), 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Fa-Gen   +2 more
core   +8 more sources

Scheme on user identity attribute preserving based on ring signcryption for cloud computing [PDF]

open access: yesTongxin xuebao, 2014
Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which ...
Shuan-bao LI   +5 more
doaj   +5 more sources

Provable security signcryption scheme based on RLWE without trapdoor [PDF]

open access: yesTongxin xuebao, 2020
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU   +3 more
doaj   +5 more sources

A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks. [PDF]

open access: yesSensors (Basel), 2022
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial ...
Hussain S   +4 more
europepmc   +3 more sources

Smart Contract E-Voting Protocol with Linkable Ring Signcryption [PDF]

open access: yesJisuanji gongcheng, 2022
Compared with traditional voting methods, electronic voting is more economical but is not open, nontransparent, and too centralized.Blockchain technology has broad application prospects and has been applied to electronic voting protocols.However ...
WANG Jiechang, ZHANG Ping, GAO Yuan, LIU Yuling
doaj   +1 more source

Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]

open access: yesJisuanji gongcheng, 2023
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj   +1 more source

Efficient Identity-Based Generalized Ring Signcryption Scheme

open access: yesKSII Transactions on Internet and Information Systems, 2016
Cai-xue Zhou, Zongmin Cui, Guangyong Gao
openaire   +2 more sources

A New ID-based Threshold Ring Signcryption without Random Oracles [PDF]

open access: yesTELKOMNIKA Indonesian Journal of Electrical Engineering, 2014
Signcryption is a cryptographic primitive which could provide authentication and confidentiality simultaneously with a computational cost lower than signing and encryption respectively, while the ring signcryption has anonymity in addition to ...
Hua Sun, Yanqiang Ge
openaire   +3 more sources

Cryptanalysis of a Certificateless Ring Signcryption Scheme

open access: yesInternational Journal of Security and Its Applications, 2015
Hongzhen Du, Qiaoyan Wen
openaire   +2 more sources

A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al. proposed a leveled fully homomorphic signcryption scheme from standard lattices.
Zhaoxuan Bian   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy