搜索结果: 1-15 共查到“军事学 Signcryption”相关记录81条 . 查询时间(0.062 秒)
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Secure mobile banking Two factor authentication Mutual authentication
2018/11/13
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments. Consumers depen...
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
Smart Grid (SG) Ciphertext-Policy Attribute-Based Signcryption (CP-ABSC) scheme Authentication
2018/3/13
With regards to the development of modern power systems, Smart Grid (SG) as an intelligent generation of electricity networks has been faced with a tremendous attention. Fine-grained data sharing in S...
In data security, the main objectives one tries to achieve are privacy, data integrity and authentication. In a public-key setting, privacy is reached through asymmetric encryption and both data integ...
A Constructive Perspective on Signcryption Security
public-key cryptography signcryption composable security
2018/1/15
Signcryption is a public-key cryptographic primitive, originally introduced by Zheng (Crypto '97), that allows parties to establish secure communication without the need of prior key agreement. Instea...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
Generic Construction of Certificateless Signcryption Scheme
Provable Security Public Key Infrastructure Insider Security
2016/3/23
Confidentiality and message authentication are the most important security goals that can be achieved simultaneously by Signcryption scheme. It is a cryptographic technique that performs both the func...
TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
Information Security Certificateless cryptography Signcryption
2016/1/25
Signcryption is a useful paradigm which simultaneously offers both the functions of encryption
and signature in a single logic step. It would be interesting to make signcryption certificateless
to e...
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Attribute-based encryption Attribute-based signature Attribute-based signcryption
2015/12/29
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption
(ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity
toge...
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Elliptic curve cryptosystem Signcryption Multicast
2015/12/29
Secure multicast communication has application in growing number of
applications. Forward secrecy is of prime importance and insures message
con謉entiality even long-term private key compromised. We ...
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
sanitizable signatures mult-input functional encryption fully homomorphic encryption
2015/12/24
We initiate the study of sanitizable signatures over encrypted data. While previous solutions for sanitizable signatures require the sanitizer to know, in clear, the original message-signature pair in...
Functional Signcryption: Notion, Construction, and Applications
functional signcryption IO SSS-NIZKPoK
2015/12/23
Functional encryption (FE) enables sophisticated control over decryption rights in a
multi-user scenario, while functional signature (FS) allows to enforce complex constraints on signing
capabilitie...
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
ABE for circuits ABSC for circuits polynomial-size circuits
2015/12/18
Designing attribute-based systems supporting highly expressive access policies has been
one of the principal focus of research in attribute-based cryptography. While attribute-based encryption
(ABE)...
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
public-key cryptography signcryption
2014/3/13
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital si...
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
cryptographic protocols
2013/2/21
This article proposes a provably secure aggregate signcryption scheme in random oracles. Security of the scheme is based on computational infesibility of solving Decisional Bilinear Diffie-Hellman Pro...
On the Security of ID Based Signcryption Schemes
public-key cryptography / cryptanalysis provable security ID-based signcryption
2012/8/28
A signcryption scheme is secure only if it satisfies both the confidentiality and the unforgeability properties. All the ID based signcryption schemes presented in the standard model till now do not h...