Results 101 to 110 of about 5,722 (251)

A Unlinkable Delegation-based Authentication Protocol with Users’ Non-repudiation for Portable Communication Systems [PDF]

open access: yes
[[abstract]]For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation.
[[corresponding]]黃心嘉   +1 more
core  

Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems

open access: yesInformatica
Signcryption integrates both signature and encryption schemes into single scheme to ensure both content unforgeability (authentication) and message confidentiality while reducing computational complexity. Typically, both signers (senders) and decrypters (
Ting-Chieh Ho   +2 more
semanticscholar   +1 more source

Efficient signcryption scheme based on Cocks’ identity cryptosystem

open access: yesTongxin xuebao, 2020
Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the ...
Changgen PENG   +3 more
doaj  

Ring signcryption scheme based on domestic cryptographic algorithm SM9

open access: yesTongxin xuebao
To address the linear computational increase with ring size in existing identity-based ring signcryption schemes, an efficient ring signcryption scheme based on the Chinese national cryptographic standard SM9 was proposed.
XIE Zhenjie   +4 more
doaj  

Multipurpose Identity-Based Signcryption [PDF]

open access: yes, 2003
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys—instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon ...
openaire   +1 more source

A Novel Efficient and Secure Privacy-Preserving Scheme for Smart Grid Based on HECC

open access: yesIEEE Access
Smart Grid (SG) is an electricity distribution network that monitors energy flow from the point of generation to its final location. The SG can save electricity usage and improve service quality at the same time.
Umair Habib   +3 more
doaj   +1 more source

Practical NTRU Signcryption in the Standard Model. [PDF]

open access: yesEntropy (Basel), 2023
Yan J   +5 more
europepmc   +1 more source

Secure and Efficient Sharing Aggregation Scheme for Data Protection in WSNs

open access: yes, 2015
International audienceWireless sensor networks (WSNs) are omnipresent in a multitude of applications. One of the important common requirements of these applications is the data security.
Bouakkaz, Feriel   +3 more
core   +1 more source

Security analysis and improvement of a certificateless signcryption scheme

open access: yesTongxin xuebao, 2015
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj  

Home - About - Disclaimer - Privacy