Abstract—In this paper, we present a signcryption scheme based on elliptic curve cryptosystem, which can perfectly integrate digital signature with public key encryption. Then, based on the proposed signcryption scheme, we design a verifiable (t, n) threshold signcryption scheme. This threshold signcryption scheme not only has the advantages of threshold scheme but also has the functions that can prevent the cheating of trusted center, the cheating of participants each other, and the cheating that participants modify their private keys. In the message recovery phase, only the specified recipient can recover the signcryption message. Our proposed scheme has small communication cost, and this cost becomes smaller by compressing the points ove...
Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the p...
The novel technique titled as “signcryption ” announced by Yuliang Zheng, completes both the functio...
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of sig...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
[[abstract]]An efficient signcryption scheme based on elliptic curve is proposed in this paper. The ...
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneo...
Signcryption schemes are compact and specially suited for efficiency-critical applications such as s...
Abstract—Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) ...
This paper presents a comprehensive signcryption scheme based on elliptic curves. In addition to the...
In this thesis two efficient signcryption schemes based on elliptic curve cryptosystem are proposed ...
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a publ...
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a publ...
Signcryption is cryptographic primitive which simultaneously provide both the function of digital si...
With the rapid growth in internet technology anonymity, repudiation and smacking the contents of mes...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the p...
The novel technique titled as “signcryption ” announced by Yuliang Zheng, completes both the functio...
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of sig...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
[[abstract]]An efficient signcryption scheme based on elliptic curve is proposed in this paper. The ...
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneo...
Signcryption schemes are compact and specially suited for efficiency-critical applications such as s...
Abstract—Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) ...
This paper presents a comprehensive signcryption scheme based on elliptic curves. In addition to the...
In this thesis two efficient signcryption schemes based on elliptic curve cryptosystem are proposed ...
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a publ...
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a publ...
Signcryption is cryptographic primitive which simultaneously provide both the function of digital si...
With the rapid growth in internet technology anonymity, repudiation and smacking the contents of mes...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the p...
The novel technique titled as “signcryption ” announced by Yuliang Zheng, completes both the functio...
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of sig...