Results 41 to 50 of about 5,722 (251)

Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives [PDF]

open access: yesJournal of Internet Services and Information Security, 2016
Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals
S. Sree Vivek   +3 more
doaj  

Certificateless Generalized Signcryption

open access: yesPhysics Procedia, 2012
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encryption and signature in a single operation, but also provide encryption or signature model alone when needed. This paper proposed a formal definition of certificateless generalized signcryption(CLGSC), then provide the security model of CLGSC.
Ji, Huifang, Han, Wenbao, Zhao, Long
openaire   +1 more source

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Key-Insulated Signcryption [PDF]

open access: yes, 2013
JUCS - Journal of Universal Computer Science Volume Nr.
Fan,Jia, Zheng,Yuliang, Tang,Xiaohu
openaire   +1 more source

Zero-configuration identity-based signcryption scheme for Smart Grid [PDF]

open access: yes, 2010
The success of future intelligent power deliver and transmission systems across the globe relies critically on the availability of a fast, scalable, and most importantly secure communication infrastructure between the energy producers and consumers.
Kwok, SHM, Lam, EY, Lui, KS, So, HKH
core   +1 more source

The Insecurity of Two Proxy Signcryption Schemes: Proxy Credential Forgery Attack and How to Prevent It [PDF]

open access: yes, 2014
Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts ...
Yeh, Jyh-haw
core   +2 more sources

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard [PDF]

open access: yes, 2015
Wireless Body Area Networks (WBAN) support a variety of real-time health monitoring and consumer electronics applications. The latest international standard for WBAN is the IEEE 802.15.6.
Toorani, Mohsen
core   +1 more source

Efficient certificateless multi-receiver anonymous signcryption scheme

open access: yesTongxin xuebao, 2016
To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was ...
Yan-lin QIN, Xiao-ping WU, Wei HU
doaj   +2 more sources

A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map

open access: yesIEEE Access, 2020
In tele-medicine, images based on patient diagnostic tests and reports are usually required to broadcast securely so that recipient can receive them without any error.
Tahir Sajjad Ali, Rashid Ali
doaj   +1 more source

Home - About - Disclaimer - Privacy