نتایج جستجو برای: certificateless signcryption scheme

تعداد نتایج: 222882  

Journal: :IEEE Access 2021

Internet of Health Things (IoHT) is a hot topic research presently, which provides reliable and intelligent healthcare system for monitoring the physical conditions patients over from anywhere anytime. The ease time-independent interaction geographically remote areas core advantage IoHT system, offers preventive or proactive facilities at lower cost. communication, on other hand, usually carrie...

2017
Shufen Niu Ling Niu Xiyan Yang Caifen Wang Xiangdong Jia

To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a certificateless cryptography system with different master keys. At the same time, all users are mapped to a distinct pseudo-identity for conditional ...

Journal: :Transactions on Data Privacy 2016
Seung-Hyun Seo Jongho Won Elisa Bertino

Certificateless Signcryption Tag Key Encapsulation Mechanism (CLSC-TKEM) is an effective method for simultaneously providing key encapsulation and a digital signature on the tag. It has applications in several security services such as communication confidentiality, integrity, authentication, and non-repudiation. Moreover, because CLSC-TKEM is based on certificateless public key cryptography (C...

2008
Pooya Farshim

In this work, we first study extensions and applications of the identity-based encryption (IBE) primitive, focusing on generic constructions. We first define what is meant by an identity-based key encapsulation mechanism before extending it to the multi-recipient setting. We then propose an efficient multi-recipient scheme based on bilinear maps and then move on to investigate the properties of...

Journal: :Computers, materials & continua 2022

Industrial internet of things (IIoT) is the usage (IoT) devices and applications for purpose sensing, processing communicating real-time events in industrial system to reduce unnecessary operational cost enhance manufacturing other industrial-related processes attain more profits. However, such IoT based smart industries need connectivity interoperability which makes them susceptible numerous c...

Journal: :Wireless Communications and Mobile Computing 2022

The Internet of Things (IoT) is a vast perceptual network formed by variety IoT devices connected to each other. In IoT, various cooperate with other collect and transmit private data sustain the efficient orderly operation IoT. However, in complex security situation due resources being limited, it difficult for afford heavy resource consumption sophisticated encryption decryption mechanism, wh...

2016
Rajesh S. Gavaskar A. Sumithra

Security remains as a big challenge as there are many advancements as well as applications being proposed in the areas wireless adhoc networks and cloud computing. The modern field of cryptography is divided into two main areas based on the basic encryption mechanism as symmetric key cryptography and Public-key cryptography. Symmetric-key cryptosystems use the same key for encryption and decryp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید