In recent years, there has been a lot of research interest in analyzing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more realistic solution for achieving message confidentiality and authentication simultaneously. However, the security of a signcryption scheme is questionable when deployed in modern safety-critical systems, especially as billions of sensitive user information is transmitted over open communication channels. In order to address this problem, a lightweight, provably secure certificateless technique that uses Fractional Chaotic Maps (FCM) for group-oriented signcryption (CGST) is proposed. The main feature...
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confid...
Signcryption is basically a cryptographic primitive which provides both signature and encryption fun...
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both me...
Signcryption schemes leveraging chaotic constructions have garnered significant research interest in...
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encrypt...
Introduction: The Internet of Things (IoT) comprises of various smart devices for the sharing of sen...
Signcryption is a cryptographic primitive which provides unforgeability and confidentiality for digi...
Abstract. Signcryption is a cryptographic primitive that fulfills both the functions of digital sign...
[[abstract]]Group key agreement is an important security mechanism for distributed communications, i...
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of sig...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the Dif...
In the last decades, several signcryption schemes have been developed for different privacy-enhancin...
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrast...
<div><p>Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key...
Abstract. Often authentication and confidentiality are required as simultaneous key requirements in ...
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confid...
Signcryption is basically a cryptographic primitive which provides both signature and encryption fun...
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both me...
Signcryption schemes leveraging chaotic constructions have garnered significant research interest in...
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encrypt...
Introduction: The Internet of Things (IoT) comprises of various smart devices for the sharing of sen...
Signcryption is a cryptographic primitive which provides unforgeability and confidentiality for digi...
Abstract. Signcryption is a cryptographic primitive that fulfills both the functions of digital sign...
[[abstract]]Group key agreement is an important security mechanism for distributed communications, i...
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of sig...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the Dif...
In the last decades, several signcryption schemes have been developed for different privacy-enhancin...
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrast...
<div><p>Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key...
Abstract. Often authentication and confidentiality are required as simultaneous key requirements in ...
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confid...
Signcryption is basically a cryptographic primitive which provides both signature and encryption fun...
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both me...