Results 31 to 40 of about 5,722 (251)

Noncommutative Lightweight Signcryption for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Key management techniques for secure wireless-sensor-networks-based applications must minimally incorporate confidentiality, authenticity, integrity, scalability, and flexibility. Signcryption is the proper primitive to do this.
Lize Gu   +3 more
doaj   +1 more source

Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]

open access: yes, 2015
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline   +2 more
core   +2 more sources

An Identity-Based Signcryption on Lattice without Trapdoor [PDF]

open access: yesJournal of Universal Computer Science, 2019
Identity-based signcryption schemes based on large integer factorization and discrete logarithm problems were considered to be insecure for the quantum computer attack. Thus, choosing a quantum-resist platform and constructing secure schemes based on new
Xianmin Wang   +4 more
doaj   +3 more sources

Constant-size threshold attribute based SignCryption for cloud applications [PDF]

open access: yes, 2017
In this paper, we propose a novel constant-size threshold attribute-based signcryption scheme for securely sharing data through public clouds. Our proposal has several advantages.
Attia, R   +4 more
core   +3 more sources

Code-based generalized signcryption scheme with multi-receiver

open access: yesTongxin xuebao, 2020
In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was ...
Yiliang HAN, Zhong WANG
doaj   +2 more sources

A secure anonymous proxy signcryption scheme

open access: yesJournal of Mathematical Cryptology, 2017
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender in case of misuse.
Saraswat Vishal   +2 more
doaj   +1 more source

Certificateless

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397].
Ziba Eslami, Nasrollah Pakniat
doaj   +1 more source

Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]

open access: yes, 2016
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline   +2 more
core   +3 more sources

Efficient Generalized Signcryption Based on Ecc [PDF]

open access: yesInternational Journal on Cryptography and Information Security, 2015
ABSTRACT In order to obtain promising wireless communication systems, it is necessary to maintain secure message transmissions in unicast, multicast, or broadcast scenarios. The cryptographic primitives can be incorporated when a node needs to submit messages to different receivers as encrypted and/or authenticated one-way messages.
Braeken, An, Porambage, Pawani
openaire   +2 more sources

On the joint security of signature and encryption schemes under randomness reuse: efficiency and security amplification [PDF]

open access: yes, 2012
Lecture Notes in Computer Science, 7341We extend the work of Bellare, Boldyreva and Staddon on the systematic analysis of randomness reuse to construct multi-recipient encryption schemes to the case where randomness is reused across different ...
C.H. Tan   +13 more
core   +3 more sources

Home - About - Disclaimer - Privacy