Results 201 to 210 of about 5,722 (251)
Some of the next articles are maybe not open access.
Signcryption with Delayed Identification
2014This paper introduces a novel cryptographic primitive called Signcryption with Delayed Identification (SCDI), where a sender signcrypts a message \(m\) such that the reciever can unsigncrypt it using his private key to recover \(m\), but cannot get any information about the identity of the sender.
Angsuman Das, Avishek Adhikari
openaire +1 more source
IEEE Internet of Things Journal
The Industrial Internet of Things (IIoT) combines several smart devices which communicate continuously with each other via the Internet, to reshape the traditional industrial process and to enable faster production and optimize processes, by monitoring ...
G. S. Rao +4 more
semanticscholar +1 more source
The Industrial Internet of Things (IIoT) combines several smart devices which communicate continuously with each other via the Internet, to reshape the traditional industrial process and to enable faster production and optimize processes, by monitoring ...
G. S. Rao +4 more
semanticscholar +1 more source
IEEE Internet of Things Journal
With the arrival of the era of self-driving technology, 5G, and IoT technology, self-driving car Internet technology is gradually changing the way people travel. The existing signcryption scheme test scheme with equality can only compare two ciphertexts,
Xiaodong Yang +4 more
semanticscholar +1 more source
With the arrival of the era of self-driving technology, 5G, and IoT technology, self-driving car Internet technology is gradually changing the way people travel. The existing signcryption scheme test scheme with equality can only compare two ciphertexts,
Xiaodong Yang +4 more
semanticscholar +1 more source
IEEE Transactions on Industrial Informatics
Most of the existing signcryption schemes utilize a key generation center to generate pseudonyms without updating, and usually opt for bilinear pairing to design authentication schemes.
Xue Li +6 more
semanticscholar +1 more source
Most of the existing signcryption schemes utilize a key generation center to generate pseudonyms without updating, and usually opt for bilinear pairing to design authentication schemes.
Xue Li +6 more
semanticscholar +1 more source
2010
The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.
openaire +2 more sources
The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.
openaire +2 more sources
Certificate-Based Generalized Ring Signcryption Scheme
International Journal of Foundations of Computer Science, 2018Generalized ring signcryption (GRSC) can realize ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system with a large number of users, or whose function may be changed, or with limited storage space.
Zhou, Caixue +3 more
openaire +2 more sources
An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme
IEEE Internet of Things JournalWith the limited resources of the Internet of Things (IoT), security and efficiency have become a challenge. The hybrid signcryption scheme is a proper method to ensure data security and integrity.
Yu Han +4 more
semanticscholar +1 more source
Security and Privacy
In the last decade, Internet of Things opened the door to applications of unmanned aerial vehicles (UAVs). Since the data is transferred on a public channel, therefore security, privacy, and efficiency are the main concerns of UAVs communication ...
Ashutosh Aithekar +2 more
semanticscholar +1 more source
In the last decade, Internet of Things opened the door to applications of unmanned aerial vehicles (UAVs). Since the data is transferred on a public channel, therefore security, privacy, and efficiency are the main concerns of UAVs communication ...
Ashutosh Aithekar +2 more
semanticscholar +1 more source
A Multi-receiver Certificateless Signcryption (MCLS) Scheme
International Conference on Cryptography, Security and PrivacyIn this paper, we substantially modify Hung et al. [1] Anonymous Multi-receiver Certificateless Encryption (AMCLE) scheme to a Multi-receiver Certificateless Signcryption (MCLS) scheme, which provides authentication and introduces public verifiability as
Alia Umrani, P. Palmieri
semanticscholar +1 more source
Signcryption with Non-interactive Non-repudiation
Designs, Codes and Cryptography, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources

