Results 41 to 50 of about 5,722 (251)
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives [PDF]
Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals
S. Sree Vivek +3 more
doaj
Certificateless Generalized Signcryption
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encryption and signature in a single operation, but also provide encryption or signature model alone when needed. This paper proposed a formal definition of certificateless generalized signcryption(CLGSC), then provide the security model of CLGSC.
Ji, Huifang, Han, Wenbao, Zhao, Long
openaire +1 more source
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj +1 more source
Key-Insulated Signcryption [PDF]
JUCS - Journal of Universal Computer Science Volume Nr.
Fan,Jia, Zheng,Yuliang, Tang,Xiaohu
openaire +1 more source
Zero-configuration identity-based signcryption scheme for Smart Grid [PDF]
The success of future intelligent power deliver and transmission systems across the globe relies critically on the availability of a fast, scalable, and most importantly secure communication infrastructure between the energy producers and consumers.
Kwok, SHM, Lam, EY, Lui, KS, So, HKH
core +1 more source
The Insecurity of Two Proxy Signcryption Schemes: Proxy Credential Forgery Attack and How to Prevent It [PDF]
Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts ...
Yeh, Jyh-haw
core +2 more sources
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard [PDF]
Wireless Body Area Networks (WBAN) support a variety of real-time health monitoring and consumer electronics applications. The latest international standard for WBAN is the IEEE 802.15.6.
Toorani, Mohsen
core +1 more source
Efficient certificateless multi-receiver anonymous signcryption scheme
To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was ...
Yan-lin QIN, Xiao-ping WU, Wei HU
doaj +2 more sources
A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map
In tele-medicine, images based on patient diagnostic tests and reports are usually required to broadcast securely so that recipient can receive them without any error.
Tahir Sajjad Ali, Rashid Ali
doaj +1 more source

