A certificateless signcryption mechanism based on blockchain for edge computing

G Xu, J Dong, C Ma, J Liu… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The emergence of edge computing makes it possible to realize new technologies, such as
virtual reality and augmented reality. However, a large number of devices and more …

Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices

A Karati, CI Fan, RH Hsu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is revolutionizing our modern lives by introducing active
connection between smart devices. However, IoT devices are repeatedly exhibiting many …

Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain

J Iqbal, AI Umar, N Amin… - International Journal of …, 2019 - journals.sagepub.com
In body sensor networks, both wearable and implantable biosensors are deployed in a
patient body to monitor and collect patient health record information. The health record …

A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications

I Ullah, N Ul Amin, M Zareei, A Zeb, H Khattak, A Khan… - Symmetry, 2019 - mdpi.com
Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables
sensors to merge with several smart devices to monitor machine status, environment, and …

[HTML][HTML] Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model

Z Eslami, N Pakniat - Journal of King Saud University-Computer and …, 2014 - Elsevier
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al.[Identity
based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS …

[PDF][PDF] 无证书公钥密码体制研究

张福泰, 孙银霞, 张磊, 耿曼曼, 李素娟 - 软件学报, 2011 - jos.org.cn
无证书公钥密码体制研究 Page 1 软件学报ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscas.ac.cn
Journal of Software,2011,22(6):1316−1332 [doi: 10.3724/SP.J.1001.2011.04007] http://www.jos.org.cn …

Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system

M Li, H Fan, Y Xiang, Y Li, Y Zhang - IEEE multimedia, 2018 - ieeexplore.ieee.org
This paper found that a novel hyper-chaotic based image encryption scheme is vulnerable
to chosen plaintext attack. By performing permutation before the vector partition and adding …

A Novel Provable Secured Signcryption Scheme 𝒫𝒮𝒮𝒮: A Hyper-Elliptic Curve-Based Approach

I Ullah, NU Amin, J Khan, M Rehan, M Naeem… - Mathematics, 2019 - mdpi.com
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known
techniques/algorithms for security protocols. These techniques suffer from higher …

Provable certificateless generalized signcryption scheme

C Zhou, W Zhou, X Dong - Designs, codes and cryptography, 2014 - Springer
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme
or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained …

[PDF][PDF] 可证安全的紧致无证书聚合签密方案

张玉磊, 王欢, 李臣意, 张永洁, 王彩芬 - 电子与信息学报, 2015 - edit.jeit.ac.cn
无证书聚合签密不仅可以保证信息传输的机密性和认证性, 还可以降低密文的验证和通信开销.
分析现有无证书聚合签密方案, 发现它们的计算效率普遍较低. 该文提出一个紧致的无证书聚合 …