Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments

A Karati, SKH Islam, GP Biswas… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in
the context of the industry as digitization becomes a business priority for various …

Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems

Y Zhao, Y Li, Q Mu, B Yang, Y Yu - IEEE Access, 2018 - ieeexplore.ieee.org
The cyber physical system (CPS) has gained considerable success in large-scale
distributed integration environment. In such systems, the sensor devices collect data which …

Certificateless signcryption scheme in the standard model

Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …

A provably secure data sharing scheme for smart gas distribution grid using fog computing

RY Patil, YH Patil, R Kachhoria, S Lonare - International Journal of …, 2022 - Springer
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …

Securing broker-less publish/subscribe systems using identity-based encryption

MA Tariq, B Koldehofe… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
The provisioning of basic security mechanisms such as authentication and confidentiality is
highly challenging in a content-based publish/subscribe system. Authentication of …

A lightweight identity based generalized signcryption scheme for secure communication in standard model

T Singh, M Kumar, DJ Gelmecha, GK Thakur… - International Journal of …, 2024 - Springer
The implementation of secure communication in the Industrial Internet of Things (IIoT) has
made and it is a significant security concern. Identity-based generalized signcryption …

An efficient heterogeneous signcryption scheme for internet of things

P Zhou, C **, Z Chen, G Chen, L Wang - Pervasive and Mobile Computing, 2023 - Elsevier
In today's world, Internet of Things (IoT) has penetrated every aspect of us. The security of
IoT is challenging because of the open nature of wireless communication and limited …

Efficient pairing-free identity-based signcryption scheme for cloud-assisted iot

MA Kiran, SK Pasupuleti, R Eswari - International Journal of Cloud …, 2022 - igi-global.com
Abstract The Internet of Things (IoT) has become a part of our everyday life. Due to limited
storage and computational capabilities, data collected by IoT devices outsource to cloud …

A Novel Provable Secured Signcryption Scheme 𝒫𝒮𝒮𝒮: A Hyper-Elliptic Curve-Based Approach

I Ullah, NU Amin, J Khan, M Rehan, M Naeem… - Mathematics, 2019 - mdpi.com
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known
techniques/algorithms for security protocols. These techniques suffer from higher …

An improved semantically-secure identity-based signcryption scheme in the standard model

Z **, Q Wen, H Du - Computers & Electrical Engineering, 2010 - Elsevier
Recently, Yu et al. proposed the first identity-based signcryption scheme without random
oracles and proved it was semantically secure in the standard model. However, in this paper …