A Unlinkable Delegation-based Authentication Protocol with Users’ Non-repudiation for Portable Communication Systems [PDF]
[[abstract]]For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation.
[[corresponding]]黃心嘉 +1 more
core
Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems
Signcryption integrates both signature and encryption schemes into single scheme to ensure both content unforgeability (authentication) and message confidentiality while reducing computational complexity. Typically, both signers (senders) and decrypters (
Ting-Chieh Ho +2 more
semanticscholar +1 more source
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the ...
Changgen PENG +3 more
doaj
Ring signcryption scheme based on domestic cryptographic algorithm SM9
To address the linear computational increase with ring size in existing identity-based ring signcryption schemes, an efficient ring signcryption scheme based on the Chinese national cryptographic standard SM9 was proposed.
XIE Zhenjie +4 more
doaj
Multipurpose Identity-Based Signcryption [PDF]
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys—instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon ...
openaire +1 more source
A Novel Efficient and Secure Privacy-Preserving Scheme for Smart Grid Based on HECC
Smart Grid (SG) is an electricity distribution network that monitors energy flow from the point of generation to its final location. The SG can save electricity usage and improve service quality at the same time.
Umair Habib +3 more
doaj +1 more source
Practical NTRU Signcryption in the Standard Model. [PDF]
Yan J +5 more
europepmc +1 more source
Secure and Efficient Sharing Aggregation Scheme for Data Protection in WSNs
International audienceWireless sensor networks (WSNs) are omnipresent in a multitude of applications. One of the important common requirements of these applications is the data security.
Bouakkaz, Feriel +3 more
core +1 more source
Security analysis and improvement of a certificateless signcryption scheme
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj
Certificateless broadcast signcryption scheme supporting equality test in smart grid. [PDF]
Niu S, Dong R, Fang L.
europepmc +1 more source

