An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S +2 more
core +2 more sources
A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang +5 more
wiley +1 more source
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj +1 more source
Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj +1 more source
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve
Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems.
Malik Zia Ullah Bashir, R. Ali
doaj +1 more source
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT
Although attribute-based signcryption (ABSC) offers a promising technology to ensure the security of IoT data sharing, it faces a two-fold challenge in practical implementation, namely, the linearly increasing computation and communication costs and the ...
Bei Gong +6 more
semanticscholar +1 more source
Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems
For telemedicine, wireless body area network (WBAN) offers enormous benefits where a patient can be remotely monitored without compromising the mobility of remote treatments. With the advent of high capacity and reliable wireless networks, WBANs are used
M. Ramadan, S. Raza
semanticscholar +1 more source
An efficient and secure quantum blind signature‐based electronic cash transaction scheme
The authors introduce a novel electronic cash (eCash) transaction scheme designed for quantum security, addressing weaknesses in existing models against quantum computing threats. By analysing various quantum blind signature mechanisms, the study identifies shortcomings and proposes an innovative quantum‐secure transaction framework inspired by D ...
Aman Gupta +3 more
wiley +1 more source
Improved Identity-Based Signcryption [PDF]
Identity-based cryptography is form of public-key cryptography that does not require users to pre-compute key pairs and obtain certificates for their public keys. Instead, public keys can be arbitrary identifiers such as email addresses. This means that the corresponding private keys are derived, at any time, by a trusted private key generator.
Liqun, Chen, Malone-Lee, John C
openaire +1 more source

