Search
Search Results
-
A lightweight identity based generalized signcryption scheme for secure communication in standard model
The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern....
-
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs
Access control refers to the mechanisms and policies determining which vehicles or entities can access certain network resources, services, or...
-
An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments
Signcryption is a highly efficient approach to simultaneously achieving message confidentiality and authentication in Human-Centered IoT (HC-IoT)...
-
POOSC: Provably online/offline signcryption scheme for vehicular communication in VANETs
The rapid advancements in computer systems and wireless sensor networks (WSNs) motivate many intelligent transportation systems (ITSs) applications...
-
Quantum-secure plaintext checkable signcryption
A public plaintext query on a ciphertext using plaintext checkable encryption is a cryptographic primitive studied extensively to promote the search...
-
Symmetric Signcryption and E2EE Group Messaging in Keybase
We introduce a new cryptographic primitive called symmetric signcryption, which differs from traditional signcryption because the sender and... -
Identity-based signcryption scheme for medical cyber physical system in standard model
The medical cyber-physical system (MCPS) has recently received massive consideration with the growth of healthcare 4.0. However, maintaining...
-
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
The risks of misusing new and develo** technology are increasing on a daily basis. In these technologies, electronic communication...
-
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing
In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the sum of software as a service (SaaS) and utility...
-
A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption
The proliferation of medical internet of things (MIoT)-enabled medical devices and systems has completely transformed the healthcare industry....
-
Hash Edward Curve Signcryption for Secure Big Data Transmission
Medical health service data is kept in huge dataset and shared through different devices. However, privacy and security of data sharing area... -
Practical heterogeneous signcryption system for vehicular communication in VANETs
Vehicular ad hoc networks (VANETs) refer to ad hoc networks where many vehicles and other devices connect to wireless communications and exchange...
-
Heterogeneous Signcryption Scheme with Equality Test for Internet of Vehicles
By collecting and using vehicle dynamic data from sensors on vehicles, Internet of Vehicles (IoV) has greatly enhanced the convenience and... -
Post-quantum blind signcryption scheme from lattice
Blind signcryption (BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous...
-
Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid
In the context of smart grids, bidirectional transmission of electricity information enables real-time electricity generation tailored to consumer... -
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms
Online game has become increasingly popular with people of all ages. But it also poses a number of security and privacy risks and children are... -
An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation
We present a generic construction of an insider secure signcryption scheme with non-interactive non-repudiation. Our construction uses as building... -
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections
The popularity of Internet traffic encryption has made encrypted traffic detection becoming a hot topic in the present academic community. Due to its... -
Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment
Cloud-based electronic medical record (EMR) management system is an emerging paradigm that enables EMR owners to store and share their EMRs with...
-
A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT
With the development of the Internet of Things (IoT), the Industrial Internet of Things (IIoT), as an extension of the IoT, has become more and more...