Results 201 to 210 of about 5,722 (251)
Some of the next articles are maybe not open access.

Signcryption with Delayed Identification

2014
This paper introduces a novel cryptographic primitive called Signcryption with Delayed Identification (SCDI), where a sender signcrypts a message \(m\) such that the reciever can unsigncrypt it using his private key to recover \(m\), but cannot get any information about the identity of the sender.
Angsuman Das, Avishek Adhikari
openaire   +1 more source

A New Lightweight and Secure Certificateless Aggregate Signcryption Scheme for Industrial Internet of Things

IEEE Internet of Things Journal
The Industrial Internet of Things (IIoT) combines several smart devices which communicate continuously with each other via the Internet, to reshape the traditional industrial process and to enable faster production and optimize processes, by monitoring ...
G. S. Rao   +4 more
semanticscholar   +1 more source

Heterogeneous Signcryption Scheme From PKI to IBC With Multi-Ciphertext Equality Test in Internet of Vehicles

IEEE Internet of Things Journal
With the arrival of the era of self-driving technology, 5G, and IoT technology, self-driving car Internet technology is gradually changing the way people travel. The existing signcryption scheme test scheme with equality can only compare two ciphertexts,
Xiaodong Yang   +4 more
semanticscholar   +1 more source

Cyber-Physical Power Systems: Exploring a Streamlined Signcryption Scheme for Resource-Limited Smart Terminals

IEEE Transactions on Industrial Informatics
Most of the existing signcryption schemes utilize a key generation center to generate pseudonyms without updating, and usually opt for bilinear pairing to design authentication schemes.
Xue Li   +6 more
semanticscholar   +1 more source

Identity-Based Signcryption

2010
The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.
openaire   +2 more sources

Certificate-Based Generalized Ring Signcryption Scheme

International Journal of Foundations of Computer Science, 2018
Generalized ring signcryption (GRSC) can realize ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system with a large number of users, or whose function may be changed, or with limited storage space.
Zhou, Caixue   +3 more
openaire   +2 more sources

An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme

IEEE Internet of Things Journal
With the limited resources of the Internet of Things (IoT), security and efficiency have become a challenge. The hybrid signcryption scheme is a proper method to ensure data security and integrity.
Yu Han   +4 more
semanticscholar   +1 more source

A secure and efficient heterogeneous ID‐based signcryption for unmanned aerial vehicular networking system

Security and Privacy
In the last decade, Internet of Things opened the door to applications of unmanned aerial vehicles (UAVs). Since the data is transferred on a public channel, therefore security, privacy, and efficiency are the main concerns of UAVs communication ...
Ashutosh Aithekar   +2 more
semanticscholar   +1 more source

A Multi-receiver Certificateless Signcryption (MCLS) Scheme

International Conference on Cryptography, Security and Privacy
In this paper, we substantially modify Hung et al. [1] Anonymous Multi-receiver Certificateless Encryption (AMCLE) scheme to a Multi-receiver Certificateless Signcryption (MCLS) scheme, which provides authentication and introduces public verifiability as
Alia Umrani, P. Palmieri
semanticscholar   +1 more source

Signcryption with Non-interactive Non-repudiation

Designs, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Home - About - Disclaimer - Privacy