نتایج جستجو برای: certificateless signcryption scheme

تعداد نتایج: 222882  

2003
Anshuman Rawat Shabsi Walfish

We present a proposed standard for signcryption (a joint signature and encryption primitive) using the Probabilistic Signature and Encryption Padding (PSEP) scheme. The standard supports signcrypting short and long messages, associated data (“labels”), and key reuse (a single RSA key suffices for both signcryption and designcryption). The proposed scheme is provably secure under the strongest k...

Journal: :Inf. Sci. 2008
Shanshan Duan

The concept of certificateless public key cryptography (CL-PKC) was introduced by Al-Riyami and Paterson. Such a cryptosystem does not suffer from the key escrow problem while avoiding the onerous management of certificates. In this paper, we present the first certificateless undeniable signature scheme. We consider two different types of adversaries and formalize the security notions for certi...

Journal: :IACR Cryptology ePrint Archive 2006
Zhenfeng Zhang Dengguo Feng

Yap, Heng and Goi propose an efficient certificateless signature scheme based on the intractability of the computational DiffieHellman problem, and prove that the scheme is secure in the random oracle model. This paper shows that their certificateless signature scheme is vulnerable to key replacement attacks, where an adversary who replaces the public key of a signer can forge valid signatures ...

2009
S. Sharmila Deva Selvi S. Sree Vivek C. Pandu Rangan

Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. Ring signcryption enables a user to signcrypt a message along with the identities of a set of potential senders (that includes him) without revealing which user in the set has actually produced the signcryption. Thus a ...

2009
Mingwu Zhang Yusheng Zhong Pengcheng Li Bo Yang

Ring signcryption, a cryptographic primitive to protect security and privacy, is an encryption and authentication scheme in a single logical step which allows a user to anonymously signcrypt a plaintext on behalf of a group of users that decrypter cannot know who is the actual signcrypter. In 2009, Zhang, Gao, Chen and Geng proposed a novel anonymous signcryption scheme(denoted as the ZGCG sche...

Journal: :IEEE Internet of Things Journal 2022

With the wide application of 5G network, much research has been carried out in recent years toward network slicing technology order to save resources and satisfy service requirements different users. Different public key cryptosystems may be deployed slicings. Therefore, heterogeneous signcryption is required achieve secure communications between slices. The existing scheme a one-to-one communi...

Journal: :I. J. Network Security 2006
Fagen Li Xiangjun Xin Yupu Hu

An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero knowledge proof for the equality of two discrete logarithms based on the bilinear map. In this scheme, any third party can verify the validity of the signature, but only more than t members in the recipient group can coope...

Journal: :Intelligent Automation and Soft Computing 2022

Confidentiality and data integrity are essential paradigms in aggregation owing to the various cyberattacks wireless sensor networks (WSNs). This study proposes a novel technique named Lamport certificateless signcryption-based shift-invariant connectionist artificial deep neural (LCS-SICADNN) by using develop security model. model utilises input layer with several nodes, four hidden layers ove...

2014
A. M. Arul Raj

Vehicular ad hoc networks are emerging as an effective technology for providing a wide range of safety applications to by-vehicle passengers. VANET is a special class of Mobile ADHOC Networks (MANET), in which the nodes are the vehicles which communicate with other vehicles or with the base station which acts as a roadside infrastructure for using security and services application. The most fav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید