نتایج جستجو برای: certificateless signcryption scheme
تعداد نتایج: 222882 فیلتر نتایج به سال:
Internet of Health Things (IoHT) is a hot topic research presently, which provides reliable and intelligent healthcare system for monitoring the physical conditions patients over from anywhere anytime. The ease time-independent interaction geographically remote areas core advantage IoHT system, offers preventive or proactive facilities at lower cost. communication, on other hand, usually carrie...
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a certificateless cryptography system with different master keys. At the same time, all users are mapped to a distinct pseudo-identity for conditional ...
Certificateless Signcryption Tag Key Encapsulation Mechanism (CLSC-TKEM) is an effective method for simultaneously providing key encapsulation and a digital signature on the tag. It has applications in several security services such as communication confidentiality, integrity, authentication, and non-repudiation. Moreover, because CLSC-TKEM is based on certificateless public key cryptography (C...
In this work, we first study extensions and applications of the identity-based encryption (IBE) primitive, focusing on generic constructions. We first define what is meant by an identity-based key encapsulation mechanism before extending it to the multi-recipient setting. We then propose an efficient multi-recipient scheme based on bilinear maps and then move on to investigate the properties of...
Industrial internet of things (IIoT) is the usage (IoT) devices and applications for purpose sensing, processing communicating real-time events in industrial system to reduce unnecessary operational cost enhance manufacturing other industrial-related processes attain more profits. However, such IoT based smart industries need connectivity interoperability which makes them susceptible numerous c...
The Internet of Things (IoT) is a vast perceptual network formed by variety IoT devices connected to each other. In IoT, various cooperate with other collect and transmit private data sustain the efficient orderly operation IoT. However, in complex security situation due resources being limited, it difficult for afford heavy resource consumption sophisticated encryption decryption mechanism, wh...
Security remains as a big challenge as there are many advancements as well as applications being proposed in the areas wireless adhoc networks and cloud computing. The modern field of cryptography is divided into two main areas based on the basic encryption mechanism as symmetric key cryptography and Public-key cryptography. Symmetric-key cryptosystems use the same key for encryption and decryp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید