Results 81 to 90 of about 5,722 (251)

An improved lightweight certificateless generalized signcryption scheme for mobile-health system

open access: yesInternational Journal of Distributed Sensor Networks, 2019
The mobile-health system, also known as the wireless body area network for remote patient monitoring, is a system used to remotely monitor the human body’s health status parameters in real time.
Caixue Zhou
doaj   +1 more source

A Novel Identity-Based Signcryption Scheme in the Standard Model

open access: yesInformation, 2017
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj   +1 more source

Attribute-based key-insulated signcryption with bidirectional anonymity

open access: yesTongxin xuebao, 2013
To solve exposure of secret key in attribute-based signcryption with anonymity for both sender and receiver, key-insulation mechanism to attribute-based signcryption was untroduced.Given the formal definition and security no-tions,the scheme of attribute-
Xing-lan ZHANG, Zhen ZHANG
doaj  

Industrial Internet of Things Threshold Signcryption Scheme Based on SM Algorithm [PDF]

open access: yesJisuanji gongcheng
The communication between the Supervisory Control And Data Acquisition (SCADA) system and terminal devices in the Industrial Internet of Things (IIoT) is vulnerable to tampering, eavesdropping, forgery, and other attacks.
LI Siqi, TIAN Youliang, PENG Changgen
doaj   +1 more source

Identity-Based Hybrid Signcryption [PDF]

open access: yes2009 International Conference on Availability, Reliability and Security, 2009
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in ...
Fagen Li   +2 more
openaire   +1 more source

Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]

open access: yesJisuanji kexue
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj   +1 more source

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

open access: yesIEEE Access, 2020
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resources ...
Tai-Hoon Kim   +7 more
doaj   +1 more source

Secure distributed signcryption scheme based on vector space

open access: yesTongxin xuebao, 2009
A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ...
LIU Jia, ZHUANG Yi, WANG Jian-dong
doaj   +2 more sources

A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC

open access: yesDianxin kexue, 2020
Anonymous heterogeneous signcryption scheme can not only transfer data confidentially for users in heterogeneous cryptographic environment,but also provide privacy protection for users of both sending and receiving sides.The security of an anonymous ...
Huifang JI   +3 more
doaj   +2 more sources

Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]

open access: yes, 2009
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core  

Home - About - Disclaimer - Privacy