Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in
the context of the industry as digitization becomes a business priority for various …
the context of the industry as digitization becomes a business priority for various …
Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
The cyber physical system (CPS) has gained considerable success in large-scale
distributed integration environment. In such systems, the sensor devices collect data which …
distributed integration environment. In such systems, the sensor devices collect data which …
Certificateless signcryption scheme in the standard model
Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …
A provably secure data sharing scheme for smart gas distribution grid using fog computing
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …
by establishing continuous on request and bidirectional data interchange between metering …
Securing broker-less publish/subscribe systems using identity-based encryption
The provisioning of basic security mechanisms such as authentication and confidentiality is
highly challenging in a content-based publish/subscribe system. Authentication of …
highly challenging in a content-based publish/subscribe system. Authentication of …
A lightweight identity based generalized signcryption scheme for secure communication in standard model
The implementation of secure communication in the Industrial Internet of Things (IIoT) has
made and it is a significant security concern. Identity-based generalized signcryption …
made and it is a significant security concern. Identity-based generalized signcryption …
An efficient heterogeneous signcryption scheme for internet of things
P Zhou, C **, Z Chen, G Chen, L Wang - Pervasive and Mobile Computing, 2023 - Elsevier
In today's world, Internet of Things (IoT) has penetrated every aspect of us. The security of
IoT is challenging because of the open nature of wireless communication and limited …
IoT is challenging because of the open nature of wireless communication and limited …
Efficient pairing-free identity-based signcryption scheme for cloud-assisted iot
Abstract The Internet of Things (IoT) has become a part of our everyday life. Due to limited
storage and computational capabilities, data collected by IoT devices outsource to cloud …
storage and computational capabilities, data collected by IoT devices outsource to cloud …
A Novel Provable Secured Signcryption Scheme 𝒫𝒮𝒮𝒮: A Hyper-Elliptic Curve-Based Approach
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known
techniques/algorithms for security protocols. These techniques suffer from higher …
techniques/algorithms for security protocols. These techniques suffer from higher …
An improved semantically-secure identity-based signcryption scheme in the standard model
Z **, Q Wen, H Du - Computers & Electrical Engineering, 2010 - Elsevier
Recently, Yu et al. proposed the first identity-based signcryption scheme without random
oracles and proved it was semantically secure in the standard model. However, in this paper …
oracles and proved it was semantically secure in the standard model. However, in this paper …