Results 71 to 80 of about 1,315,010 (177)
Ring signcryption scheme based on domestic cryptographic algorithm SM9
To address the linear computational increase with ring size in existing identity-based ring signcryption schemes, an efficient ring signcryption scheme based on the Chinese national cryptographic standard SM9 was proposed.
XIE Zhenjie +4 more
doaj
Improved identity based multi-receiver anonymous signcryption scheme [PDF]
Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this ...
Bo ZHANG, Dai-rong YU, Tao SUN
core +1 more source
Security Analysis in Body Area Networks using Attribute-based Ring Signcryption Scheme
At present, Body Area Networks (BANs) are budding as one of the major research interests, predominantly in the field of personal health monitoring. In view of the fact that health data are extremely private and includes sensitive details, the security of
A. Srinivasan
semanticscholar +1 more source
Several Pubic Key Cryptography Schemes And Several Semigroups Of Transformations [PDF]
本文包括两方面的内容,一是提出了几个新的公钥密码方案;二是研究了几个变换半群的结构。 公钥密码(PublicKeyCryptography,简记为PKC)是实现网络和信息安全的重要技术。 传统的公钥设施(PublicKeyInfrastructure,简记为PKI)要求设立一个可信中心,由其向个人发放证书,将个人的身份与公钥邦定,这就要求进行证书管理。为解决上述问题,1984年,Shamir提出了一种新的公钥体制:基于身份的密码方案,其要求建立一个可信第三方---私钥生成中心 ...
邓伦治
core
In this paper, we propose a privacy preserving protocol based on multi - receiver conditional anonymous ring signcryption. The sender can not only send the same messageto the selected multi-receiver and only selected users can correct to decrypt the ...
Qian Wang, Mingxing He, Xiao Zheng
semanticscholar +1 more source
Practical NTRU Signcryption in the Standard Model. [PDF]
Yan J +5 more
europepmc +1 more source
BINARY EDWARDS CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
Edwards curves are a new normal form for elliptic curves that exhibit some cryp- tographically desirable properties and advantages over the typical Weierstrass form.
Enos, Graham +1 more
core
Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem
This study presents an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the properties of elliptic curve cryptosystem and ring signature. While the signers are endowed with anonymity through the technique of ring signature, the elliptic curve cryptosystem achieves the advantages of high security, low computation ...
Tzer-Shyong Chen +3 more
openaire +2 more sources
Efficient identity based signcryption scheme and solution of key-escrow problem [PDF]
In cryptography for sending any information from sender to receiver, we have to ensure about the three types of security policies i.e. integrity, confidentiality and authentication. For confidentiality purpose, encryption-decryption technique is used and
Kumar, Vikas
core
Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography [PDF]
In this thesis two efficient signcryption schemes based on elliptic curve cryptosystem are proposed which can effectively combine the functionalities of digital signature and encryption and also take a comparable amount of computational cost and ...
Mohapatra, Ramesh Kumar
core

