Results 171 to 180 of about 5,722 (251)
Some of the next articles are maybe not open access.
2010
The primary motivation for signcryption was the gain in efficiency when both encryption and signing need to be performed. These two cryptographic operations may be done sequentially either by first encrypt and then sign (EtS) or alternatively, by first sign and then encrypt (StE).
Pieprzyk, Josef, Pointcheval, David
openaire +2 more sources
The primary motivation for signcryption was the gain in efficiency when both encryption and signing need to be performed. These two cryptographic operations may be done sequentially either by first encrypt and then sign (EtS) or alternatively, by first sign and then encrypt (StE).
Pieprzyk, Josef, Pointcheval, David
openaire +2 more sources
Efficient Certificateless Signcryption
Anais Estendidos do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg Estendido 2008), 2008This article does not have an abstract.
Diego Aranha +3 more
openaire +1 more source
Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT
IEEE Transactions on Information Forensics and SecurityThe Internet of Medical Things (IoMT) has gained significant research focus in both academic and medical institutions. Nevertheless, the sensitive data involved in IoMT raises concerns regarding user validation and data privacy. To address these concerns,
Shiyuan Xu +5 more
semanticscholar +1 more source
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
IEEE Internet of Things JournalSmart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation.
Yahui Wang +4 more
semanticscholar +1 more source
Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT
IEEE Internet of Things JournalThe Internet of Medical Things (IoMT) builds a bridge between patients and doctors, facilitating patients’ being diagnosed and monitored by uploading physiological indicators without visiting the hospital.
Jianhong Zhang, Chenghe Dong, Yining Liu
semanticscholar +1 more source
Efficient Distributed Signcryption Scheme as Group Signcryption
2003The existing distributed signcryption is designed for distributing a signcrypted message to a designated group. However, it does not provide confidentiality of sender ID and its extension to a group signcryption has certain weakness. This study solves the weakness and extends to an efficient group signcryption.
DongJin Kwak, SangJae Moon
openaire +1 more source
IEEE Transactions on Industrial Informatics
In vehicular ad hoc networks, the exchange of safety messages plays a crucial role in transportation efficiency and safety. However, safety messages are generally only signed rather than encrypted when broadcast, which lures malicious attackers to ...
Huishuang Shao, Changhao Piao
semanticscholar +1 more source
In vehicular ad hoc networks, the exchange of safety messages plays a crucial role in transportation efficiency and safety. However, safety messages are generally only signed rather than encrypted when broadcast, which lures malicious attackers to ...
Huishuang Shao, Changhao Piao
semanticscholar +1 more source
IDTRSC: ID-Based Traceable Ring Signcryption Framework for Data Sharing Without Key Escrow
IEEE Transactions on Vehicular TechnologyThe capability to share data across different entities is increasingly pronounced in our data-driven and centric society. However, we also have to ensure properties such as data confidentiality, unforgeability, anonymity and traceability are supported in
Jiannan Wei +5 more
semanticscholar +1 more source
Provably Secure (Broadcast) Homomorphic Signcryption
International Journal of Foundations of Computer Science, 2019Signcryption has drawn a lot of attention due to its useful applications in many areas, in particular for applications where the computation and communication resources are constrained, for example, for lightweight devices. The traditional signcryption scheme does not support the homomorphic property. Recent work by Rezaeibagha et al.
Rezaeibagha, Fatemeh +3 more
openaire +3 more sources
A Secure and Efficient Pairing-Free Certificateless Aggregate Signcryption Scheme for V2G Networks
IEEE Systems JournalThe vehicle-to-grid (V2G) network is an infrastructure for electric vehicles (EVs) to be charged and discharged. As EVs are increasingly connected to V2G networks, V2G networks are facing serious data security problems. Attackers may eavesdrop on, tamper
Baoyi Wang, Xue Guo, Shaomin Zhang
semanticscholar +1 more source

