Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments

A Karati, SKH Islam, GP Biswas… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in
the context of the industry as digitization becomes a business priority for various …

A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing

YS Rao - Future Generation Computer Systems, 2017 - Elsevier
Abstract In recent years, Personal Health Record (PHR) system has attracted intensive
attention due to its universal accessibility and low cost. The practical deployment of PHR …

Efficient pairing-free identity-based signcryption scheme for cloud-assisted iot

MA Kiran, SK Pasupuleti, R Eswari - International Journal of Cloud …, 2022 - igi-global.com
Abstract The Internet of Things (IoT) has become a part of our everyday life. Due to limited
storage and computational capabilities, data collected by IoT devices outsource to cloud …

Identity-based signcryption scheme for medical cyber physical system in standard model

RY Patil, YH Patil - International Journal of Information Technology, 2022 - Springer
The medical cyber-physical system (MCPS) has recently received massive consideration
with the growth of healthcare 4.0. However, maintaining confidentially of such highly …

Privacy preservation and drone authentication using Id-Based Signcryption

S Benzarti, B Triki, O Korbaa - New Trends in Intelligent …, 2018 - ebooks.iospress.nl
By the recent years, the use of UAV (Unmanned Aerial Vehicle) also known as drone have
witnessed a remarkable increase. Drones are no longer limited for military services as in the …

ID based signcryption scheme in standard model

SSD Selvi, SS Vivek, D Vinayagamurthy… - Provable Security: 6th …, 2012 - Springer
Designing an ID based signcryption scheme in the standard model is among the most
interesting and important problems in cryptography. However, all the existing systems in the …

An efficient pairing-free certificateless signcryption without secure channel communication during secret key issuance☆

A Karati, CI Fan, JJ Huang - Procedia Computer Science, 2020 - Elsevier
Signcryption is one of the recent public key paradigms that satisfies both the requirement of
authenticity and confidentiality of messages between parties. However, most of all the …

[PDF][PDF] Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model.

Y Ming, Y Wang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Identity based signcryption (IBSC) is a novel cryptographic primitive that simultaneously
provides the authentication and encryption in a single logic step. The IBSC has been shown …

A novel identity-based signcryption scheme in the standard model

Y Huang, J Yang - Information, 2017 - mdpi.com
Identity-based signcryption is a useful cryptographic primitive that provides both
authentication and confidentiality for identity-based crypto systems. It is challenging to build …

[PDF][PDF] Provable secure identity based signcryption schemes without random oracles

P Kushwah, S Lal - International Journal of Network Security & Its …, 2012 - academia.edu
Signcryption is a cryptographic primitive which performs encryption and signature in a single
logical step with the cost lower than signature-then-encryption approach. Recently, Li et …