搜索结果: 1-15 共查到“军队指挥学 Signcryption scheme”相关记录26条 . 查询时间(0.094 秒)
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
Smart Grid (SG) Ciphertext-Policy Attribute-Based Signcryption (CP-ABSC) scheme Authentication
2018/3/13
With regards to the development of modern power systems, Smart Grid (SG) as an intelligent generation of electricity networks has been faced with a tremendous attention. Fine-grained data sharing in S...
Generic Construction of Certificateless Signcryption Scheme
Provable Security Public Key Infrastructure Insider Security
2016/3/23
Confidentiality and message authentication are the most important security goals that can be achieved simultaneously by Signcryption scheme. It is a cryptographic technique that performs both the func...
TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
Information Security Certificateless cryptography Signcryption
2016/1/25
Signcryption is a useful paradigm which simultaneously offers both the functions of encryption
and signature in a single logic step. It would be interesting to make signcryption certificateless
to e...
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Elliptic curve cryptosystem Signcryption Multicast
2015/12/29
Secure multicast communication has application in growing number of
applications. Forward secrecy is of prime importance and insures message
con謉entiality even long-term private key compromised. We ...
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
cryptographic protocols
2013/2/21
This article proposes a provably secure aggregate signcryption scheme in random oracles. Security of the scheme is based on computational infesibility of solving Decisional Bilinear Diffie-Hellman Pro...
A Multi-Receiver ID-Based Generalized Signcryption Scheme
public-key cryptography / Multi-receiver identity-based generalized signcryption
2012/6/14
Generalized signcryption(GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. In this paper, the formal definition and security notion...
A Multi-Receiver ID-Based Generalized Signcryption Scheme
public-key cryptography / Multi-receiver identity-based generalized signcryption Bilinear pairing Provable security andomness re-use Selective identity security Random oracle model
2012/3/22
Generalized signcryption(GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. In this paper, the formal definition and security notion...
A Multi-Receiver ID-Based Generalized Signcryption Scheme
public-key cryptography / Multi-receiver identity-based generalized signcryption Bilinear pairing Provable security Randomness re-use Selective identity security Random oracle model
2012/3/21
Generalized signcryption(GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. In this paper, the formal definition and security notion...
Identity Based Online/Offline Signcryption Scheme
public-key cryptography Online Offline Signcryption Identity Based Cryptography Confidentiality Unforgeability Random Oracle Model
2010/7/14
Online/Offline signcryption is a cryptographic primitive where the signcryption process is divided into two phases - online and offline phase. Most of the computations are carried out offline (where t...
Identity Based Public Verifiable Signcryption Scheme
Signcryption Public verifiable Signcryption Cryptanalysis Identity Based Bilinear Pairing
2010/7/14
In this paper, we show the security weaknesses in three existing schemes \cite{BaoD98}, \cite{TsoOO08} and \cite{ChowYHC03}. The schemes in \cite{BaoD98} and \cite{TsoOO08} are in the Public Key Infra...
Breaking and Re-Building a Certificateless Hybrid Signcryption Scheme
Certificateless Cryptography Signcryption, Cryptanalysis Hybrid Signcryption
2009/9/27
Often authentication and confidentiality are required as counterparts in many cryptographic
applications. Both these functionalities are efficiently achieved simultaneously by the cryptographic
prim...
Breaking and Re-Building a Certificateless Hybrid Signcryption Scheme
Certificateless Cryptography Signcryption Cryptanalysis Hybrid Signcryption
2009/9/22
Often authentication and confidentiality are required as counterparts in many cryptographic
applications. Both these functionalities are efficiently achieved simultaneously by the cryptographic
prim...
Anonymous ID Based Signcryption Scheme for Multiple Receivers
Signcryption ring signcryption multi-receiver signcryption
2009/7/22
Anonymous signcryption is synonyms of ring signcryption which provides anonymity of
the sender along with the advantages of signcryption. Multi receiver signcryption is suited for
situation where a ...
A note on the Certificateless Multi-receiver Signcryption Scheme
Certificateless Signcryption Multi-receiver
2009/7/14
Certificateless cryptography aims at combining the advantages
of identity based and public key cryptography, so as to avoid the
key escrow problem inherent in the identity based system and cumbersom...
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Identity Based Cryptography Signcryption Cryptanalysis
2009/6/15
Signcryption is a cryptographic primitive that provides authentication and confidentiality
simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a
sin...