Results 61 to 70 of about 5,722 (251)

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

open access: yes, 2012
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S   +2 more
core   +2 more sources

A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang   +5 more
wiley   +1 more source

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

open access: yesJournal of Applied Mathematics, 2014
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj   +1 more source

Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]

open access: yesPLoS ONE, 2017
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj   +1 more source

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

open access: yesElectronics Letters, 2019
Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems.
Malik Zia Ullah Bashir, R. Ali
doaj   +1 more source

SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT

open access: yesIEEE Transactions on Information Forensics and Security
Although attribute-based signcryption (ABSC) offers a promising technology to ensure the security of IoT data sharing, it faces a two-fold challenge in practical implementation, namely, the linearly increasing computation and communication costs and the ...
Bei Gong   +6 more
semanticscholar   +1 more source

Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems

open access: yesIEEE Internet of Things Journal, 2023
For telemedicine, wireless body area network (WBAN) offers enormous benefits where a patient can be remotely monitored without compromising the mobility of remote treatments. With the advent of high capacity and reliable wireless networks, WBANs are used
M. Ramadan, S. Raza
semanticscholar   +1 more source

An efficient and secure quantum blind signature‐based electronic cash transaction scheme

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 619-631, December 2024.
The authors introduce a novel electronic cash (eCash) transaction scheme designed for quantum security, addressing weaknesses in existing models against quantum computing threats. By analysing various quantum blind signature mechanisms, the study identifies shortcomings and proposes an innovative quantum‐secure transaction framework inspired by D ...
Aman Gupta   +3 more
wiley   +1 more source

Improved Identity-Based Signcryption [PDF]

open access: yes, 2005
Identity-based cryptography is form of public-key cryptography that does not require users to pre-compute key pairs and obtain certificates for their public keys. Instead, public keys can be arbitrary identifiers such as email addresses. This means that the corresponding private keys are derived, at any time, by a trusted private key generator.
Liqun, Chen, Malone-Lee, John C
openaire   +1 more source

Home - About - Disclaimer - Privacy