Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings

L Pang, M Kou, M Wei, H Li - IEEE Access, 2018 - ieeexplore.ieee.org
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research
hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes …

Efficient distributed decryption scheme for IoT gateway-based applications

C Peng, J Chen, P Vijayakumar, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
With the evolvement of the Internet of things (IoT), privacy and security have become the
primary indicators for users to deploy IoT applications. In the gateway-based IoT …

A typology of secure multicast communication over 5 G/6 G networks

N Din, A Waheed, S Ullah, NU Amin… - International Journal of …, 2023 - Springer
The growth of media services, multimedia conferencing, interactive distance learning, and
distributed interactive simulations is becoming more dependent on the security of multicast …

A novel multi-receiver signcryption scheme with complete anonymity

L Pang, X Yan, H Zhao, Y Hu, H Li - PloS one, 2016 - journals.plos.org
Anonymity, which is more and more important to multi-receiver schemes, has been taken
into consideration by many researchers recently. To protect the receiver anonymity, in 2010 …

Multi‐document threshold signcryption scheme

CH Tsai, PC Su - Security and Communication Networks, 2015 - Wiley Online Library
Without proper and well‐managed encryption, digital communications interception is
technically easy to tap over public networks, and it causes unauthorized disclosure of …

Leakage-resilient anonymous multi-recipient signcryption under a continual leakage model

TT Tsai, YM Tseng, SS Huang, JY Xie, YH Hung - IEEE Access, 2022 - ieeexplore.ieee.org
A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both multi-
recipient public-key encryption and digital signature to ensure both integrity and …

Anonymous and efficient certificateless multirecipient signcryption scheme for ecological data sharing

P Su, Y Xie, P Liu - Journal of Sensors, 2020 - Wiley Online Library
Air pollution, water pollution, soil erosion, land desertification, and other environmental
issues are becoming more and more serious. And ecological security has become a key …

Optimal ECC-based signcryption algorithm for secured video compression process in H. 264 encoder

S Rajagopal, A Shenbagavalli - International Journal of …, 2020 - inderscienceonline.com
Combination of cryptography method and video technology is a video encryption. Video
encryption process is a total and demonstrable security of video data. For the purpose of …

Efficient multi-receiver heterogenous signcryption

S Raveendranath, A Aneesh - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In this paper, an efficient multi-receiver heterogenous signcryption based on elliptic curve
cryptography is proposed. Most of the existing heterogenous signcryption schemes are …

[PDF][PDF] Secure protocol for mobile agents using proxy signcryption scheme based on hyper elliptic curve

Z Ullah, I Ullah, H Khan, H Khattak… - International Journal of …, 2016 - academia.edu
Proxy signcryption are used in mobile commerce for the delegation of signing privileges
these days. On the other hand hyper elliptic curve cryptography is attractive for low resource …