Analysis and improvement of authenticatable ring signcryption scheme [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Fa-Gen +2 more
core +8 more sources
Scheme on user identity attribute preserving based on ring signcryption for cloud computing [PDF]
Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which ...
Shuan-bao LI +5 more
doaj +5 more sources
Provable security signcryption scheme based on RLWE without trapdoor [PDF]
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU +3 more
doaj +5 more sources
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks. [PDF]
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial ...
Hussain S +4 more
europepmc +3 more sources
Smart Contract E-Voting Protocol with Linkable Ring Signcryption [PDF]
Compared with traditional voting methods, electronic voting is more economical but is not open, nontransparent, and too centralized.Blockchain technology has broad application prospects and has been applied to electronic voting protocols.However ...
WANG Jiechang, ZHANG Ping, GAO Yuan, LIU Yuling
doaj +1 more source
Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj +1 more source
Efficient Identity-Based Generalized Ring Signcryption Scheme
Cai-xue Zhou, Zongmin Cui, Guangyong Gao
openaire +2 more sources
A New ID-based Threshold Ring Signcryption without Random Oracles [PDF]
Signcryption is a cryptographic primitive which could provide authentication and confidentiality simultaneously with a computational cost lower than signing and encryption respectively, while the ring signcryption has anonymity in addition to ...
Hua Sun, Yanqiang Ge
openaire +3 more sources
Cryptanalysis of a Certificateless Ring Signcryption Scheme
Hongzhen Du, Qiaoyan Wen
openaire +2 more sources
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme
With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al. proposed a leveled fully homomorphic signcryption scheme from standard lattices.
Zhaoxuan Bian +6 more
wiley +1 more source

