Results 71 to 80 of about 1,315,010 (177)

Ring signcryption scheme based on domestic cryptographic algorithm SM9

open access: yesTongxin xuebao
To address the linear computational increase with ring size in existing identity-based ring signcryption schemes, an efficient ring signcryption scheme based on the Chinese national cryptographic standard SM9 was proposed.
XIE Zhenjie   +4 more
doaj  

Improved identity based multi-receiver anonymous signcryption scheme [PDF]

open access: yes, 2015
Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this ...
Bo ZHANG, Dai-rong YU, Tao SUN
core   +1 more source

Security Analysis in Body Area Networks using Attribute-based Ring Signcryption Scheme

open access: yes, 2016
At present, Body Area Networks (BANs) are budding as one of the major research interests, predominantly in the field of personal health monitoring. In view of the fact that health data are extremely private and includes sensitive details, the security of
A. Srinivasan
semanticscholar   +1 more source

Several Pubic Key Cryptography Schemes And Several Semigroups Of Transformations [PDF]

open access: yes, 2012
本文包括两方面的内容,一是提出了几个新的公钥密码方案;二是研究了几个变换半群的结构。 公钥密码(PublicKeyCryptography,简记为PKC)是实现网络和信息安全的重要技术。 传统的公钥设施(PublicKeyInfrastructure,简记为PKI)要求设立一个可信中心,由其向个人发放证书,将个人的身份与公钥邦定,这就要求进行证书管理。为解决上述问题,1984年,Shamir提出了一种新的公钥体制:基于身份的密码方案,其要求建立一个可信第三方---私钥生成中心 ...
邓伦治
core  

Privacy-preserving Communication for Vehicular with Multi Receiver Conditionally Anonymous Ring Signcryption

open access: yes, 2016
In this paper, we propose a privacy preserving protocol based on multi - receiver conditional anonymous ring signcryption. The sender can not only send the same messageto the selected multi-receiver and only selected users can correct to decrypt the ...
Qian Wang, Mingxing He, Xiao Zheng
semanticscholar   +1 more source

Practical NTRU Signcryption in the Standard Model. [PDF]

open access: yesEntropy (Basel), 2023
Yan J   +5 more
europepmc   +1 more source

BINARY EDWARDS CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2013
Edwards curves are a new normal form for elliptic curves that exhibit some cryp- tographically desirable properties and advantages over the typical Weierstrass form.
Enos, Graham   +1 more
core  

Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem

open access: yesAdvances in Intelligent Systems Research, 2006
This study presents an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the properties of elliptic curve cryptosystem and ring signature. While the signers are endowed with anonymity through the technique of ring signature, the elliptic curve cryptosystem achieves the advantages of high security, low computation ...
Tzer-Shyong Chen   +3 more
openaire   +2 more sources

Efficient identity based signcryption scheme and solution of key-escrow problem [PDF]

open access: yes, 2014
In cryptography for sending any information from sender to receiver, we have to ensure about the three types of security policies i.e. integrity, confidentiality and authentication. For confidentiality purpose, encryption-decryption technique is used and
Kumar, Vikas
core  

Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography [PDF]

open access: yes, 2010
In this thesis two efficient signcryption schemes based on elliptic curve cryptosystem are proposed which can effectively combine the functionalities of digital signature and encryption and also take a comparable amount of computational cost and ...
Mohapatra, Ramesh Kumar
core  

Home - About - Disclaimer - Privacy