A new identity based signcryption scheme from pairings
We present a new identity based scheme using pairings over elliptic curves. It combines the
functionalities of signature and encryption and is provably secure in the random oracle …
functionalities of signature and encryption and is provably secure in the random oracle …
Formal proofs for the security of signcryption
Signcryption is a public key or asymmetric cryptographic method that provides
simultaneously both message confidentiality and unforgeability at a lower computational …
simultaneously both message confidentiality and unforgeability at a lower computational …
Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC
K Kobara, H Imai - Public Key Cryptography: 4th International Workshop …, 2001 - Springer
Almost all of the current public-key cryptosystems (PKCs) are based on number theory, such
as the integer factoring problem and the discrete logarithm problem (which will be solved in …
as the integer factoring problem and the discrete logarithm problem (which will be solved in …
Multi-recipient public-key encryption with shortened ciphertext
K Kurosawa - Public Key Cryptography: 5th International Workshop …, 2002 - Springer
In the trivial n-recipient public-key encryption scheme, a ciphertext is a concatenation of
independently encrypted messages for n recipients. In this paper, we say that an n-recipient …
independently encrypted messages for n recipients. In this paper, we say that an n-recipient …
Efficient signcryption with key privacy from gap Diffie-Hellman groups
This paper proposes a new public key authenticated encryption (signcryption) scheme
based on the Diffie-Hellman problem in Gap Diffie-Hellman groups. This scheme is built on …
based on the Diffie-Hellman problem in Gap Diffie-Hellman groups. This scheme is built on …
Unconventional computing based on magnetic tunnel junction
The conventional computing method based on the von Neumann architecture is limited by a
series of problems such as high energy consumption, finite data exchange bandwidth …
series of problems such as high energy consumption, finite data exchange bandwidth …
Formal proofs for the security of signcryption
Signcryption is an asymmetric cryptographic method that provides simultaneously both
message confidentiality and unforgeability at a low computational and communication …
message confidentiality and unforgeability at a low computational and communication …
Threshold attribute-based signcryption
M Gagné, S Narayan, R Safavi-Naini - International Conference on …, 2010 - Springer
In this paper, we propose a new threshold attribute-based signcryption scheme secure in the
standard model. The scheme provides message confidentiality, and authenticity of a …
standard model. The scheme provides message confidentiality, and authenticity of a …
Lightweight multifactor authentication scheme for nextgen cellular networks
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …
small-cell communication will result in effective device-to-device (D2D) communication. High …
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
In body sensor networks, both wearable and implantable biosensors are deployed in a
patient body to monitor and collect patient health record information. The health record …
patient body to monitor and collect patient health record information. The health record …