Results 161 to 170 of about 5,722 (251)

Identity-Based Hybrid Signcryption

open access: yesIdentity-Based Hybrid Signcryption
openaire  

A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing

IEEE Internet of Things Journal, 2023
The emergence of edge computing makes it possible to realize new technologies, such as virtual reality and augmented reality. However, a large number of devices and more messages at the edge bring more security problems.
Guangxia Xu, Jingnan Dong, Chuang
exaly   +2 more sources

Identity-Based Broadcast Signcryption Scheme for Vehicular Platoon Communication

IEEE Transactions on Industrial Informatics, 2023
Vehicular platooning is emerging as a promising method that can enhance road utilization, alleviate traffic congestion, and even decrease energy expenditure by shortening the distance between vehicles in the platoon.
Yanan Zhao, Haiyang Yu, Yilong Ren
exaly   +2 more sources

Unlinkable Signcryption Scheme for Multi-Receiver in VANETs

IEEE Transactions on Intelligent Transportation Systems, 2023
An increasing number of researchers are turning their attention to signcryption, particularly in the context of multi-receiver communication scenarios, due to its ability to simultaneously provide authentication, integrity, and confidentiality of ...
Hongyang, Yi-Ning Liu
exaly   +2 more sources

SIGNCRYPTION ANALYZE [PDF]

open access: yesJournal of Information Systems and Operations Management, 2011
The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.
Laura Savu
openaire   +3 more sources

ECC-Based Certificateless Aggregate Signcryption Scheme in Cyber-Physical Power Systems

IEEE Systems Journal
The signcryption schemes play an important role in keeping the security of information interactions among the devices in cyber-physical power systems (CPPSs).
Xue Li, Renqing Zhu, Dajun Du
exaly   +2 more sources

Indentity-based broadcast signcryption

Computer Standards and Interfaces, 2008
Broadcast encryption schemes allow a center to deliver encrypted data to a large set of users so that only a particular subset of privileged users can decrypt it. Most of previous works about broadcast encryption only provide confidentiality of the message.
Fagen Li
exaly   +2 more sources

Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles

IEEE Transactions on Vehicular Technology, 2023
The emergence of the vehicular ad-hoc network (VANETs) could meet the need for an efficient and safe transportation. Vehicles wirelessly interact with nearby road-side units (RSUs) and send the data to the cloud servers (CS), but this approach has ...
Zhan Xie   +5 more
semanticscholar   +1 more source

Lattice‐based signcryption

Concurrency and Computation: Practice and Experience, 2012
SUMMARYSigncryption is a cryptographic primitive that performs simultaneously both the functions of digital signature and public‐key encryption, at a cost significantly lower than that required by the traditional signature‐ then‐encryption approach.
Fagen Li   +3 more
openaire   +1 more source

A Secure Pairing-Free Certificateless Online/Offline Signcryption Scheme With Batch Verification for Edge Computing-Based VANETs

IEEE Transactions on Vehicular Technology
In modern transportation systems, vehicular ad hoc networks (VANETs) provide a solid foundation for improving public transportation. To efficiently realize real-time and secure vehicle communication systems, many certificateless signcryption (CLSC ...
Wenjie Yang, Peiwei Cao, Futai Zhang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy