Improved identity-based signcryption
Witryna1 mar 2012 · We proposed an improved identity-based signcryption scheme. The security of the improved scheme is proved in the standard model. We compared efficiency and security of our scheme with those of existing schemes. Introduction Identity-based cryptography was introduced by Shamir [1]. Witryna25 maj 2015 · An improved semantically-secure identity-based signcryption scheme in the standard model, Computers and Electrical Engineering 2010; Volume 36 pp.545-552. Google Scholar Liu Z, Hu Y, Zhang X, Ma H. Certificateless signcryption scheme in the standard model, Information Sciences 2010 Volume 180: pp.452-464. Google …
Improved identity-based signcryption
Did you know?
Witryna1 mar 2012 · We proposed an improved identity-based signcryption scheme. The security of the improved scheme is proved in the standard model. We compared … Witryna1 mar 2012 · An identity-based signcryption scheme should satisfy two basic security notions. These notions are semantic security (i.e. indistinguishability against adaptive …
WitrynaImproved Identity-Based Signcryption 365 3.1 Ciphertext Authentication A scheme offering ciphertext authentication provides the guarantee to the re-cipient of a …
WitrynaIn this paper we describe a new identity-based signcryption (IBSC) scheme built upon bilinear maps. This scheme turns out to be more efficient than all others proposed so … Witryna25 kwi 2010 · Signcryption is an important cryptography primitive that provides confidentiality and authenticity for the messages simultaneously, at lower costs than traditional sign-then-encrypt method. This paper presents the attacks against two identity-based signcryption schemes: the Zhang et al.'s assertion signcryption …
Witryna1 maj 2015 · In this paper, we propose a new privacy-enhancing group signcryption scheme that provides: unforgeability, confidentiality, ciphertext and sender anonymity, traceability, unlinkability,...
Witryna2 dni temu · Invasive fungal infection (IFI) in immunocompromised neonates is significantly associated with high morbidity and mortality and has become the third most common infection in Neonatal Intensive Care Units. The early diagnosis of IFI for neonatal patients is difficult because of the lack of specific symptoms. The traditional … high hopes hailla ballWitrynaThe improved scheme has shorter ciphertext size than the ZYZZ scheme. We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticata- ... Several ID-based signcryption schemes have been proposed so far, e.g. [4,6,7,8,16,19]. In addition, many variations of ID-based signcryption were … high hopes geniusWitryna11 kwi 2024 · Transformer-based large language models are rapidly advancing in the field of machine learning research, with applications spanning natural language, biology, chemistry, and computer programming. Extreme scaling and reinforcement learning from human feedback have significantly improved the quality of generated text, enabling … how is a binary search tree implementedWitryna3 wrz 2024 · This article presents an overview of a new multilayer node event processing (MNEP) method for improved data center energy efficiency and event management monitoring in its physical infrastructure. Event management is essential for the provision and maintenance of the reliability and functionality of the physical infrastructure. For … how is a bitcoin minedWitryna1 maj 2010 · To make up for this flaw, in this paper, an improved IBSC scheme is proposed and is shown to be really secure in the standard model. In our improvement, a random string is embedded into the signcrypted message during executing instructions of the signcryption algorithm. how is a bladder lift doneWitrynaImproved Identity-Based Signcryption Abstract. Identity-based cryptography is form of public-key cryptography that does not require users to pre-compute key... Author information. Editor information. Rights and permissions. Copyright information. About … high hopes graphic hoodie xsWitryna1 maj 2010 · To make up for this flaw, in this paper, an improved IBSC scheme is proposed and is shown to be really secure in the standard model. In our improvement, … how is a bladder tack done