Results 181 to 190 of about 5,722 (251)
Some of the next articles are maybe not open access.

Efficient Constructions of Signcryption Schemes and Signcryption Composability

2009
In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead.
Takahiro Matsuda   +2 more
openaire   +1 more source

Secure ID-Based Proxy Signcryption Scheme with Designated Proxy Signcrypter

2009 International Conference on Multimedia Information Networking and Security, 2009
Signcryption is a kind of cryptographic primitive which allows combining the signature and encryption into one scheme efficiently. In this paper we first improve the proxy key generation protocol enforced by Tasi et al and then propose a novel identity based proxy signcryption scheme based on the improved proxy key generation protocol and a identity ...
Xiu-Xia Tian   +4 more
openaire   +1 more source

Efficient and Provably Secure Offline/Online Heterogeneous Signcryption Scheme for VANETs

IEEE Internet of Things Journal
With the rapid advancement of wireless communication and autonomous driving technology, vehicular ad hoc networks (VANETs) has emerged as a robust network facilitating interactive communication among vehicles, roadside infrastructure, and the surrounding
Yahui Wang   +4 more
semanticscholar   +1 more source

Applications of Signcryption

2010
Signcryption can provide improvements on efficiency for public-key cryptographic protocols over more traditional cryptographic mechanisms that offer security functions separately. Notably, applying signcryption in protocols where message confidentiality, integrity, and authenticity are all required is expected to result in protocols with better ...
Yang Cui, Goichiro Hanaoka
openaire   +1 more source

A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles

IEEE Transactions on Vehicular Technology, 2023
The Internet of Vehicles (IoVs) is a wireless network of intelligent and autonomous vehicles and Roadside Units (RSUs), which work together to improve transportation services.
Insaf Ullah   +5 more
semanticscholar   +1 more source

Heterogeneous Broadcast Signcryption Scheme With Equality Test for IoVs

IEEE Transactions on Vehicular Technology
To ensure the privacy and security of charging services under Internet of Vehicles (IoVs) environment, it is critical to secure the charging stations (CSs) interaction with multiple electric vehicles (EVs).
Yingzhe Hou   +5 more
semanticscholar   +1 more source

Plaintext Checkable Signcryption

2015
Digital signature guarantees the authenticity and encryption ensures the confidentiality of a transmitted message. Signcryption, as the name indicates, is a primitive which serves both these purpose with added efficiency and features. In this paper, we introduce a variant of signcryption called Plaintext Checkable Signcryption PCSC, which extends ...
Angsuman Das, Avishek Adhikari
openaire   +1 more source

Identity based KCDSA signcryption

2006 8th International Conference Advanced Communication Technology, 2006
Many signciyption schemes have been proposed to provide authentication and confidentiality of a message efficiently. Among such a scheme, identity-based cryptography is one of the public key cryptography that does not require the certificate for a public key and pre-compute key pair.
null Jong-Ho Ryu   +2 more
openaire   +1 more source

Boolean Searchable Attribute-Based Signcryption With Search Results Self-Verifiability Mechanism for Data Storage and Retrieval in Clouds

IEEE Transactions on Services Computing
Storing and sharing confidential data in a public cloud storage system always raises privacy and security issues. When data is outsourced to a cloud server, the basic demands are secure and authenticated data storage, fine-grained data access control ...
Ieee Y. Sreenivasa Rao Member   +7 more
semanticscholar   +1 more source

Universally Composable Signcryption

2007
One of the challenges within public-key based cryptosystems is providing the user with a convenient interface, while retaining security. In the universal composability framework, we propose an ideal functionality for secure messaging, with a user-friendly interface.
Kristian Gjøsteen, Lillian Kråkmo
openaire   +1 more source

Home - About - Disclaimer - Privacy