A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)

S Hussain, I Ullah, H Khattak, MA Khan… - Journal of Information …, 2021 - Elsevier
Abstract Recently, the Industrial Internet of Things (IIoT) has become increasingly important
for applications in the industry. IIoT has essentially become a prime security focus for …

Securing internet of drones with identity-based proxy signcryption

MA Khan, H Shah, SU Rehman, N Kumar… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is a decentralized networking architecture that makes use of the
internet for uniting drones to enter controlled airspace in a coordinated manner. On the one …

A provably secure data sharing scheme for smart gas distribution grid using fog computing

RY Patil, YH Patil, R Kachhoria, S Lonare - International Journal of …, 2022 - Springer
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …

ID-based safety message authentication for security and trust in vehicular networks

S Biswas, J Misic, V Misic - 2011 31st international conference …, 2011 - ieeexplore.ieee.org
We present a safety message authentication scheme for vehicular ad hoc networks using an
ID-based signature and verification mechanism. An ID-based technique offers a certificate …

A secure and efficient identity-based proxy signcryption in cloud data sharing

NW Hundera, Q Mei, H Xiong… - KSII Transactions on …, 2020 - koreascience.kr
As a user in modern societies with the rapid growth of Internet environment and more
complicated business flow processes in order to be effective at work and accomplish things …

A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity

PP Tsang, MH Au, JK Liu, W Susilo… - Provable Security: 4th …, 2010 - Springer
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984,
numerous ID-based signature schemes have been proposed. In 2001, Rivest et al …

Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model

A Waheed, AI Umar, M Zareei, N Din, NU Amin… - IEEE …, 2020 - ieeexplore.ieee.org
Proxy signcryption is essential security primitive for emerging secure communication such
as e-business, mobile agents, online voting, contract signing, and online auction. It …

Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city

NW Hundera, C Jin, DM Geressu, MU Aftab… - Multimedia Tools and …, 2022 - Springer
The incessant advancements in technology and the rapid growth of wireless sensors will
lead to the Internet of Things (IoT), a global computing network in which everything will be …

Identity‐Based Proxy Signcryption Protocol with Universal Composability

H Yu, Z Wang, J Li, X Gao - Security and Communication …, 2018 - Wiley Online Library
Proxy signcryption means that the proxy signcrypter obtains the delegate authorization from
the original signcrypter and then signcrypts the specified message on behalf of the original …

[PDF][PDF] An Identity Based Proxy Signcryption Scheme without Pairings.

H Guo, L Deng - Int. J. Netw. Secur., 2020 - ijns.jalaxy.com.tw
The identity-based cryptography avoids the storage problem of public key certificate of
public key infrastructure. The signcryption mechanism completes both authentication and …