Improved identity-based signcryption
WitrynaProvably secure identity-based threshold unsigncryption scheme; Article . Free Access. Provably secure identity-based threshold unsigncryption scheme. Authors: Bo Yang. College of information, South China Agricultural University, Guangzhou, P.R. China. Witryna19 sie 2002 · An IDentity-Based Signcryption (IDBS) [4] is used for communication confidentiality, authenticity and integrity, both among peers, and between the central …
Improved identity-based signcryption
Did you know?
WitrynaIn this paper we describe a new identity-based signcryption (IBSC) scheme built upon bilinear maps. This scheme turns out to be more efficient than all others proposed so … Witryna1 maj 2015 · In this paper, we propose a new privacy-enhancing group signcryption scheme that provides: unforgeability, confidentiality, ciphertext and sender anonymity, traceability, unlinkability,...
Witryna1 lut 2010 · The proposed certificateless signcryption scheme In this section, we propose a certificateless signcryption scheme secure against malicious-but-passive KGC attacks in the standard model. The proposed scheme involves three parties: a KGC, a sender with an identity u S and a receiver with an identity u R. Witryna26 sie 2024 · An Improved Identity-Based Generalized Signcryption Scheme for Secure Multi-Access Edge Computing Empowered Flying Ad Hoc Networks Abstract: …
WitrynaImproved Identity-Based Signcryption 365 3.1 Ciphertext Authentication A scheme offering ciphertext authentication provides the guarantee to the re-cipient of a … WitrynaWe propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map.
WitrynaThe adversary is able to obtain some secret information from side channel attacks, which further damages the security for the system. To resolve this issue, we provide a hierarchical identity-based online/offline encryption scheme which resists side ...
WitrynaCertificateless public key cryptography eliminatescertificate management in traditional public key infrastructure and solves the key escrow problem in identity-based cryptography. Certificateless signcryption is one of the most important primitives in certificateless public key cryptography which achieves confidentiality and … china bmx bicycleWitryna6 mar 2024 · Signcryption requires less computational complexity, communication cost, and implementation effort. Moving ahead, Deng and Boa [ 4] suggested a scheme to reduce computational cost by up to 16% and communication cost by up to 85% when compared to the signature-then-encryption technique. graffiti pete in the heights movieWitryna25 kwi 2010 · Signcryption is an important cryptography primitive that provides confidentiality and authenticity for the messages simultaneously, at lower costs than traditional sign-then-encrypt method. This paper presents the attacks against two identity-based signcryption schemes: the Zhang et al.'s assertion signcryption … china board shorts supplierWitrynaThe idea of signcryption is to provide a method to encrypt and sign data together in a way that is more e cient than using an encryption scheme combined with a signature … china board game makerWitryna17 maj 2004 · Improved Identity-Based Signcryption Liqun Chen and John Malone-Lee Abstract We present an identity-based signcryption scheme that we believe is … china boarding schoolWitryna1 maj 2010 · To make up for this flaw, in this paper, an improved IBSC scheme is proposed and is shown to be really secure in the standard model. In our improvement, … china boarding up homesWitrynaIdentity-based signcryption was rst proposed by Malone-Lee [51], and was then intensively studied thereafter (e.g., [20,26,11,8]). The reader is referred to [43] for a good survey on ID-based signcryption. Identity-based signcryption has numerous promising applications. For example, it is used in secure and privacy- graffiti pier history