Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings
L Pang, M Kou, M Wei, H Li - IEEE Access, 2018 - ieeexplore.ieee.org
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research
hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes …
hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes …
Efficient distributed decryption scheme for IoT gateway-based applications
With the evolvement of the Internet of things (IoT), privacy and security have become the
primary indicators for users to deploy IoT applications. In the gateway-based IoT …
primary indicators for users to deploy IoT applications. In the gateway-based IoT …
A typology of secure multicast communication over 5 G/6 G networks
The growth of media services, multimedia conferencing, interactive distance learning, and
distributed interactive simulations is becoming more dependent on the security of multicast …
distributed interactive simulations is becoming more dependent on the security of multicast …
A novel multi-receiver signcryption scheme with complete anonymity
L Pang, X Yan, H Zhao, Y Hu, H Li - PloS one, 2016 - journals.plos.org
Anonymity, which is more and more important to multi-receiver schemes, has been taken
into consideration by many researchers recently. To protect the receiver anonymity, in 2010 …
into consideration by many researchers recently. To protect the receiver anonymity, in 2010 …
Multi‐document threshold signcryption scheme
CH Tsai, PC Su - Security and Communication Networks, 2015 - Wiley Online Library
Without proper and well‐managed encryption, digital communications interception is
technically easy to tap over public networks, and it causes unauthorized disclosure of …
technically easy to tap over public networks, and it causes unauthorized disclosure of …
Leakage-resilient anonymous multi-recipient signcryption under a continual leakage model
TT Tsai, YM Tseng, SS Huang, JY Xie, YH Hung - IEEE Access, 2022 - ieeexplore.ieee.org
A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both multi-
recipient public-key encryption and digital signature to ensure both integrity and …
recipient public-key encryption and digital signature to ensure both integrity and …
Anonymous and efficient certificateless multirecipient signcryption scheme for ecological data sharing
P Su, Y Xie, P Liu - Journal of Sensors, 2020 - Wiley Online Library
Air pollution, water pollution, soil erosion, land desertification, and other environmental
issues are becoming more and more serious. And ecological security has become a key …
issues are becoming more and more serious. And ecological security has become a key …
Optimal ECC-based signcryption algorithm for secured video compression process in H. 264 encoder
S Rajagopal, A Shenbagavalli - International Journal of …, 2020 - inderscienceonline.com
Combination of cryptography method and video technology is a video encryption. Video
encryption process is a total and demonstrable security of video data. For the purpose of …
encryption process is a total and demonstrable security of video data. For the purpose of …
Efficient multi-receiver heterogenous signcryption
S Raveendranath, A Aneesh - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In this paper, an efficient multi-receiver heterogenous signcryption based on elliptic curve
cryptography is proposed. Most of the existing heterogenous signcryption schemes are …
cryptography is proposed. Most of the existing heterogenous signcryption schemes are …
[PDF][PDF] Secure protocol for mobile agents using proxy signcryption scheme based on hyper elliptic curve
Proxy signcryption are used in mobile commerce for the delegation of signing privileges
these days. On the other hand hyper elliptic curve cryptography is attractive for low resource …
these days. On the other hand hyper elliptic curve cryptography is attractive for low resource …