Results 211 to 220 of about 5,722 (251)
Some of the next articles are maybe not open access.
A Novel Framework in Cloud Security: Remote Signcryption
IEEE Internet of Things JournalEnsuring data integrity and confidentiality is critical in communication systems. Traditional methods, such as separate encryption and signature schemes, often lead to inefficiencies. While signcryption methods address both needs simultaneously, they are
Mohammad Ali, Ximeng Liu
semanticscholar +1 more source
Universal Designated Verifier Signcryption
2012Universal Designated Verifier Signature (UDVS) was introduced by Steinfeld et al. in Asiacrypt'03. UDVS allows a signature holder, who has a signature of a signer, to convince a designated verifier that he is in possession of a signer's signature, while the verifier cannot transfer such conviction to anyone else.
Fei Tang, Changlu Lin, Pinhui Ke
openaire +1 more source
IEEE Transactions on Intelligent Vehicles
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles.
Yingzhe Hou +5 more
semanticscholar +1 more source
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles.
Yingzhe Hou +5 more
semanticscholar +1 more source
Provably Secure Homomorphic Signcryption
2017Signcryption has shown many useful applications, in particular for the environment where the computation and communication resources are constrained, for instance, for applications on lightweight devices. However, we notice that traditional signcryption schemes do not support homomorphic properties, which are very useful in many application scenarios ...
Rezaeibagha, Fatemeh +3 more
openaire +2 more sources
Maintaining Chain of Custody using Attribute Based Signcryption (ABSC)
International Conference on Evolutionary ComputationIn the evolving digital world, the exchange of information or raw data has been so easy, but their security has been diminished due advancement in technology.
P. Patil +3 more
semanticscholar +1 more source
Identity-Based Transitive Signcryption
2014Transitive signatures allow a signer to authenticate a graph in such a way that given two signatures on adjacent edges (i, j) and (j, k), anyone with public information can compose a signature on edge (i, k). In all existing transitive signature schemes, to prevent signature exposure, a secure channel is required between the signer and the recipient to
Shuquan Hou, Xinyi Huang, Li Xu
openaire +1 more source
Distributed Signcryption from Pairings
2011The distributed signcryption scheme was proposed by Mu and Varadharajan in their paper presented at INDOCRYPT 2000. Since then some more schemes have been proposed for distributed signcryption and extended for group signcryption. In 2007, Li et al [15] proposed signcryption scheme with key privacy.
Indivar Gupta, P. K. Saxena
openaire +1 more source
Privacy Preserving Signcryption Scheme
2016Signcryption is a public-key cryptographic primitive that is a synthesis of encryption and digital signature schemes. We present a signcryption scheme using anonymous attribute based encryption. The scheme uses the notion of identity-based digital signature on the message encrypted under the attribute based encryption scheme.
Payal Chaudhari, Manik Lal Das
openaire +1 more source
IEEE Internet of Things Journal
Named data networking (NDN), which is an implementation of information-centric networking (ICN), has emerged as a promising new direction in networking as a result of the shortcomings of the transmission control protocol/Internet protocol (TCP/IP ...
C. N. A. Cobblah +5 more
semanticscholar +1 more source
Named data networking (NDN), which is an implementation of information-centric networking (ICN), has emerged as a promising new direction in networking as a result of the shortcomings of the transmission control protocol/Internet protocol (TCP/IP ...
C. N. A. Cobblah +5 more
semanticscholar +1 more source
Threshold Attribute-Based Signcryption
2010In this paper, we propose a new threshold attribute-based signcryption scheme secure in the standard model. The scheme provides message confidentiality, and authenticity of a message in addition to attesting the attributes of the sender. Such a property is useful in applications such as electronic card, digital prescription carrier devices, secure and ...
Martin Gagné +2 more
openaire +1 more source

