Signcryption is a cryptographic primitive which provides unforgeability and confidentiality for digital communications. Many signcryption schemes have been constructed in the literature for secure communication between smart objects. But, many of these existing schemes are not secure and inefficient for resource constrained applications like WSNs, Mobile computing, VANETs and IoT applications. To enrich the security and efficiency issues, in this paper, we propose a new signcryption scheme in certificateless based framework and prove its security under the CDHP and ECDLP assumptions. The efficiency analysis indicates that our scheme is more efficient than other existing signcryption schemes and is well suitable for resource-constrained appl...
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a publ...
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encrypt...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of...
1326-1335Signcryption is a cryptographic primitive which provides unforgeability and confidentiality...
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived ...
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of proble...
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confid...
Abstract. Signcryption is a cryptographic primitive that fulfills both the functions of digital sign...
Electronic prescription is increasingly popular in our society, particularly in technologically adva...
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrast...
<div><p>Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key...
Certificateless cryptography inherits a solution to the certificate management problem in public-key...
Certificateless public key cryptography (CL-PKC) promises a practical resolution in establishing pra...
Abstract. In this paper we describe how to construct an efficient certificateless signcryption schem...
Signcryption, which was introduced by ZHENG, is a cryptographic primitive that fulfils the functions...
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a publ...
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encrypt...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of...
1326-1335Signcryption is a cryptographic primitive which provides unforgeability and confidentiality...
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived ...
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of proble...
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confid...
Abstract. Signcryption is a cryptographic primitive that fulfills both the functions of digital sign...
Electronic prescription is increasingly popular in our society, particularly in technologically adva...
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrast...
<div><p>Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key...
Certificateless cryptography inherits a solution to the certificate management problem in public-key...
Certificateless public key cryptography (CL-PKC) promises a practical resolution in establishing pra...
Abstract. In this paper we describe how to construct an efficient certificateless signcryption schem...
Signcryption, which was introduced by ZHENG, is a cryptographic primitive that fulfils the functions...
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a publ...
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encrypt...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of...