Results 31 to 40 of about 5,722 (251)
Noncommutative Lightweight Signcryption for Wireless Sensor Networks
Key management techniques for secure wireless-sensor-networks-based applications must minimally incorporate confidentiality, authenticity, integrity, scalability, and flexibility. Signcryption is the proper primitive to do this.
Lize Gu +3 more
doaj +1 more source
Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline +2 more
core +2 more sources
An Identity-Based Signcryption on Lattice without Trapdoor [PDF]
Identity-based signcryption schemes based on large integer factorization and discrete logarithm problems were considered to be insecure for the quantum computer attack. Thus, choosing a quantum-resist platform and constructing secure schemes based on new
Xianmin Wang +4 more
doaj +3 more sources
Constant-size threshold attribute based SignCryption for cloud applications [PDF]
In this paper, we propose a novel constant-size threshold attribute-based signcryption scheme for securely sharing data through public clouds. Our proposal has several advantages.
Attia, R +4 more
core +3 more sources
Code-based generalized signcryption scheme with multi-receiver
In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was ...
Yiliang HAN, Zhong WANG
doaj +2 more sources
A secure anonymous proxy signcryption scheme
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender in case of misuse.
Saraswat Vishal +2 more
doaj +1 more source
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397].
Ziba Eslami, Nasrollah Pakniat
doaj +1 more source
Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline +2 more
core +3 more sources
Efficient Generalized Signcryption Based on Ecc [PDF]
ABSTRACT In order to obtain promising wireless communication systems, it is necessary to maintain secure message transmissions in unicast, multicast, or broadcast scenarios. The cryptographic primitives can be incorporated when a node needs to submit messages to different receivers as encrypted and/or authenticated one-way messages.
Braeken, An, Porambage, Pawani
openaire +2 more sources
On the joint security of signature and encryption schemes under randomness reuse: efficiency and security amplification [PDF]
Lecture Notes in Computer Science, 7341We extend the work of Bellare, Boldyreva and Staddon on the systematic analysis of randomness reuse to construct multi-recipient encryption schemes to the case where randomness is reused across different ...
C.H. Tan +13 more
core +3 more sources

