Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

MZU Bashir, R Ali - Electronics Letters, 2019 - Wiley Online Library
Blind signcryption schemes are the extension of signcryption schemes. They are used to
protect the privacy and identity of the sender from other users, especially in electronic voting …

An ECC‐based blind signcryption scheme for multiple digital documents

CH Tsai, PC Su - Security and Communication Networks, 2017 - Wiley Online Library
The popularity of the Internet has comprehensively altered the traditional way of
communication and interaction patterns, such as e‐contract negotiations, e‐payment …

An Efficient Multidocument Blind Signcryption Scheme for Smart Grid‐Enabled Industrial Internet of Things

AM Abdullah, I Ullah, MA Khan… - Wireless …, 2022 - Wiley Online Library
The smart grid‐enabled industrial Internet of Things (SG‐IIoT) is a hybrid data
communication network connected with the power grid that collects and analyzes data from …

Kernel homomorphic encryption protocol

S Ullah, XY Li, MT Hussain, Z Lan - Journal of Information Security and …, 2019 - Elsevier
In electronic environ and cloud computing, the growth rate of noises or errors and
computation is increasing day-by-day. Once the number of noises is exceeded the whole …

A multi recipient aggregate signcryption scheme based on elliptic curve

M Zia Ullah Bashir, R Ali - Wireless Personal Communications, 2020 - Springer
A cryptographic technique called signcryption combines the role of digital signature and
encryption in a single logical step. This helps in reducing the computational cost associated …

[PDF][PDF] An efficient proxy blind signcryption scheme for IoT

A Khan, I Ullah, F Algarni, M Naeem, MI Uddin… - Comput. Mater …, 2022 - academia.edu
Recent years have witnessed growing scientific research interest in the Internet of Things
(IoT) technologies, which supports the development of a variety of applications such as …

DSAC-Digital Signature for Access Control in Information Centric Network

Z Ullah, MIU Haq, S Khan, M Zubair - 2021 - preprints.org
The world is growing very rapidly concerning technology. In the next-generation Internet, the
existing architecture requires to be upgraded from Host-Centric Networking paradigm to …

Certificateless blind signcryption with low complexity

H Yu, Z Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Elliptic curve cryptosystem (ECC) has the merits of providing shorter key length and higher
processing speed compared with other public key cryptosystems with respect to the same …

[PDF][PDF] Analysis and Improvement of Some Signcryption Schemes Based on Elliptic Curve

MZU Bashir - PhD diss., CAPITAL UNIVERSITY, 2022 - cust.edu.pk
Signcryption is a new technique in cryptography that fulfills the security requirements of
encryption and digital signature in a single logical step. This helps in reducing the …