Results 171 to 180 of about 5,722 (251)
Some of the next articles are maybe not open access.

Parallel Signcryption

2010
The primary motivation for signcryption was the gain in efficiency when both encryption and signing need to be performed. These two cryptographic operations may be done sequentially either by first encrypt and then sign (EtS) or alternatively, by first sign and then encrypt (StE).
Pieprzyk, Josef, Pointcheval, David
openaire   +2 more sources

Efficient Certificateless Signcryption

Anais Estendidos do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg Estendido 2008), 2008
This article does not have an abstract.
Diego Aranha   +3 more
openaire   +1 more source

Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT

IEEE Transactions on Information Forensics and Security
The Internet of Medical Things (IoMT) has gained significant research focus in both academic and medical institutions. Nevertheless, the sensitive data involved in IoMT raises concerns regarding user validation and data privacy. To address these concerns,
Shiyuan Xu   +5 more
semanticscholar   +1 more source

Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs

IEEE Internet of Things Journal
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation.
Yahui Wang   +4 more
semanticscholar   +1 more source

Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT

IEEE Internet of Things Journal
The Internet of Medical Things (IoMT) builds a bridge between patients and doctors, facilitating patients’ being diagnosed and monitored by uploading physiological indicators without visiting the hospital.
Jianhong Zhang, Chenghe Dong, Yining Liu
semanticscholar   +1 more source

Efficient Distributed Signcryption Scheme as Group Signcryption

2003
The existing distributed signcryption is designed for distributing a signcrypted message to a designated group. However, it does not provide confidentiality of sender ID and its extension to a group signcryption has certain weakness. This study solves the weakness and extends to an efficient group signcryption.
DongJin Kwak, SangJae Moon
openaire   +1 more source

A Provably Secure Lightweight Authentication Based on Elliptic Curve Signcryption for Vehicle-to-Vehicle Communication in VANETs

IEEE Transactions on Industrial Informatics
In vehicular ad hoc networks, the exchange of safety messages plays a crucial role in transportation efficiency and safety. However, safety messages are generally only signed rather than encrypted when broadcast, which lures malicious attackers to ...
Huishuang Shao, Changhao Piao
semanticscholar   +1 more source

IDTRSC: ID-Based Traceable Ring Signcryption Framework for Data Sharing Without Key Escrow

IEEE Transactions on Vehicular Technology
The capability to share data across different entities is increasingly pronounced in our data-driven and centric society. However, we also have to ensure properties such as data confidentiality, unforgeability, anonymity and traceability are supported in
Jiannan Wei   +5 more
semanticscholar   +1 more source

Provably Secure (Broadcast) Homomorphic Signcryption

International Journal of Foundations of Computer Science, 2019
Signcryption has drawn a lot of attention due to its useful applications in many areas, in particular for applications where the computation and communication resources are constrained, for example, for lightweight devices. The traditional signcryption scheme does not support the homomorphic property. Recent work by Rezaeibagha et al.
Rezaeibagha, Fatemeh   +3 more
openaire   +3 more sources

A Secure and Efficient Pairing-Free Certificateless Aggregate Signcryption Scheme for V2G Networks

IEEE Systems Journal
The vehicle-to-grid (V2G) network is an infrastructure for electric vehicles (EVs) to be charged and discharged. As EVs are increasingly connected to V2G networks, V2G networks are facing serious data security problems. Attackers may eavesdrop on, tamper
Baoyi Wang, Xue Guo, Shaomin Zhang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy