Results 51 to 60 of about 5,722 (251)
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core +2 more sources
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core +2 more sources
Lattice-based ring signcryption for consortium blockchain
Ring signcryption with no group administrator satisfies the decentralization and blockchain anonymity. In this article, we construct new lattice-based ring signcryption scheme suitable for consortium blockchain (CB-LRSCS), in which the smart contract ...
Huifang Yu, Zhirui Lv
doaj +1 more source
Provable Secure Generalized Signcryption [PDF]
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an en- cryption scheme, a signature scheme or a signcryption scheme[5]. However,the security proof in their paper is uncorrect. our contribution are as following:First we give security notions for this new primitive.Secnond,we give an attack to [4] which ...
Xu an Wang, Xiaoyuan Yang, Jindan Zhang
openaire +1 more source
Signcryption scheme based on schnorr digital signature
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area.
Savu, Laura
core +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk +2 more
wiley +1 more source
Signcryption schemes with insider security in an ideal permutation model
Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS&E) method allows to perform encryption and signing in parallel ...
Bansal Tarun Kumar +2 more
doaj +1 more source
Identity Based Generalized Signcryption Scheme in the Standard Model
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting.
Xiaoqin Shen, Yang Ming, Jie Feng
doaj +1 more source
Coop-DAAB : cooperative attribute based data aggregation for Internet of Things applications [PDF]
The deployment of IoT devices is gaining an expanding interest in our daily life. Indeed, IoT networks consist in interconnecting several smart and resource constrained devices to enable advanced services. Security management in IoT is a big challenge as
C Delerablée +9 more
core +4 more sources
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam +4 more
wiley +1 more source

