A new identity based signcryption scheme from pairings

B Libert, JJ Quisquater - Proceedings 2003 IEEE Information …, 2003 - ieeexplore.ieee.org
We present a new identity based scheme using pairings over elliptic curves. It combines the
functionalities of signature and encryption and is provably secure in the random oracle …

Formal proofs for the security of signcryption

J Baek, R Steinfeld, Y Zheng - … : 5th International Workshop on Practice and …, 2002 - Springer
Signcryption is a public key or asymmetric cryptographic method that provides
simultaneously both message confidentiality and unforgeability at a lower computational …

Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC

K Kobara, H Imai - Public Key Cryptography: 4th International Workshop …, 2001 - Springer
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such
as the integer factoring problem and the discrete logarithm problem (which will be solved in …

Multi-recipient public-key encryption with shortened ciphertext

K Kurosawa - Public Key Cryptography: 5th International Workshop …, 2002 - Springer
In the trivial n-recipient public-key encryption scheme, a ciphertext is a concatenation of
independently encrypted messages for n recipients. In this paper, we say that an n-recipient …

Efficient signcryption with key privacy from gap Diffie-Hellman groups

B Libert, JJ Quisquater - Public Key Cryptography–PKC 2004: 7th …, 2004 - Springer
This paper proposes a new public key authenticated encryption (signcryption) scheme
based on the Diffie-Hellman problem in Gap Diffie-Hellman groups. This scheme is built on …

Unconventional computing based on magnetic tunnel junction

B Cai, Y He, Y **n, Z Yuan, X Zhang, Z Zhu, G Liang - Applied Physics A, 2023 - Springer
The conventional computing method based on the von Neumann architecture is limited by a
series of problems such as high energy consumption, finite data exchange bandwidth …

Formal proofs for the security of signcryption

J Baek, R Steinfeld, Y Zheng - Journal of cryptology, 2007 - Springer
Signcryption is an asymmetric cryptographic method that provides simultaneously both
message confidentiality and unforgeability at a low computational and communication …

Threshold attribute-based signcryption

M Gagné, S Narayan, R Safavi-Naini - International Conference on …, 2010 - Springer
In this paper, we propose a new threshold attribute-based signcryption scheme secure in the
standard model. The scheme provides message confidentiality, and authenticity of a …

Lightweight multifactor authentication scheme for nextgen cellular networks

AS Khan, Y Javed, RM Saqib, Z Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …

Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain

J Iqbal, AI Umar, N Amin… - International Journal of …, 2019 - journals.sagepub.com
In body sensor networks, both wearable and implantable biosensors are deployed in a
patient body to monitor and collect patient health record information. The health record …