Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography

P Kasyoka, M Kimwele, SM Angolo - Engineering Reports, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) have found use in many areas ranging from military to
healthcare among other areas of interest. Multiuser broadcast authentication is an important …

QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing

S Ullah, MT Hussain, M Yousaf - Multimedia Tools and Applications, 2022 - Springer
In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the
sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve …

Cryptanalysis of a quantum identity-based signature and its improvement

YS Rao, V Srivastava, T Mohanty… - Quantum Information …, 2024 - Springer
Digital signatures are one of the key cryptographic components for providing authenticity
and non-repudiation. To circumvent the need of certificates, Shamir in 1984 introduced …

An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication

T Mohanty, V Srivastava, SK Debnath, D Roy… - arXiv preprint arXiv …, 2024 - arxiv.org
Digital signatures are one of the simplest cryptographic building blocks that provide
appealing security characteristics such as authenticity, unforgeability, and undeniability. In …

Escrow-less identity-based signature scheme with outsourced protection in cloud computing

M Kumar, S Chand - Wireless Personal Communications, 2020 - Springer
The identity-based cryptosystem (IBC) outfits with the most beneficial key management
procedures. The IBC is bounded to the small network system due to the internal key escrow …

Design and Analysis of Pairing-Friendly Elliptic Curves for Cryptographic Primitives

M Kumar - arXiv preprint arXiv:2307.09610, 2023 - arxiv.org
Elliptic curve cryptography (ECC) is a remarkable mathematical tool that offers the same
level of security as traditional public-key cryptography (PKC) with a significantly smaller key …

[PDF][PDF] Certificateless signcryption for Wireless Sensor Networks

PN Kasyoka - 2022 - ir.jkuat.ac.ke
Wireless sensor networks (WSNs) have become popular in the field of information and
communications technology, they are increasingly being used in applications such as …

Provable Secure Escrow-Free Identity-Based Signature Scheme for Smart City Environment

M Kumar, S Chand - 2022 - researchsquare.com
Smart city is a concept of digitalizing the ecosystem to solve many urban area issues such
as crime reduction, transportation, waste management, and governance. However, the …