An improved lightweight certificateless generalized signcryption scheme for mobile-health system
The mobile-health system, also known as the wireless body area network for remote patient monitoring, is a system used to remotely monitor the human body’s health status parameters in real time.
Caixue Zhou
doaj +1 more source
A Novel Identity-Based Signcryption Scheme in the Standard Model
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj +1 more source
Attribute-based key-insulated signcryption with bidirectional anonymity
To solve exposure of secret key in attribute-based signcryption with anonymity for both sender and receiver, key-insulation mechanism to attribute-based signcryption was untroduced.Given the formal definition and security no-tions,the scheme of attribute-
Xing-lan ZHANG, Zhen ZHANG
doaj
Industrial Internet of Things Threshold Signcryption Scheme Based on SM Algorithm [PDF]
The communication between the Supervisory Control And Data Acquisition (SCADA) system and terminal devices in the Industrial Internet of Things (IIoT) is vulnerable to tampering, eavesdropping, forgery, and other attacks.
LI Siqi, TIAN Youliang, PENG Changgen
doaj +1 more source
Identity-Based Hybrid Signcryption [PDF]
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in ...
Fagen Li +2 more
openaire +1 more source
Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj +1 more source
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resources ...
Tai-Hoon Kim +7 more
doaj +1 more source
Secure distributed signcryption scheme based on vector space
A kind of new distributed signcryption protocol was proposed based on the ideal vector space secret sharing scheme and the modified signcryption scheme of Zheng1.Without the involvement of a trusted key distribution center, this protocol could gain its ...
LIU Jia, ZHUANG Yi, WANG Jian-dong
doaj +2 more sources
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
Anonymous heterogeneous signcryption scheme can not only transfer data confidentially for users in heterogeneous cryptographic environment,but also provide privacy protection for users of both sending and receiving sides.The security of an anonymous ...
Huifang JI +3 more
doaj +2 more sources
Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core

