• No results found

18 results with keyword: 'provable secure identity based generalized signcryption scheme'

Provable secure identity based generalized signcryption scheme

We say that identity based generalized signcryption in encryption mode is IND-(IDGSC-IN-EN)-CCA secure if no polynomially bounded adversary A has a non-negligible advantage in Game

Protected

N/A

11
0
0
2021
Provable  Secure  Generalized  Signcryption

– Must be the same algorithm as Gen.. For example, when considering confidentiality of Generalized Signcryption in encryption-mode, we must note adversary can get both Decryption

Protected

N/A

16
0
0
2020
An efficient identity based generalized signcryption scheme

In Section 2 , we define the identity based generalized signcryption scheme and propose a simplified security model for identity based generalized signcryption (IBGSC).. Section

Protected

N/A

8
0
0
2021
An Improved Certificateless Generalized Signcryption Scheme

Along with this we also have proposed two schemes of which first one is an Identity based Generalized Signcryption Scheme and second one is a Certificateless Generalized

Protected

N/A

67
0
0
2021
Chosen ciphertext secure authenticated group communication using identity-based signcryption

In this study, we propose an authenticated group communication scheme which is secure against an adaptive chosen ciphertext attack using identity-based signcryption.. The

Protected

N/A

14
0
0
2021
ID  based  generalized  signcryption

This paper presents an identity based generalized signcryption scheme based on bilinear pairing and discusses its security for message confidentiality non repudiation and

Protected

N/A

26
0
0
2020
The  Exact  Security  of  an  Identity  Based  Signature   and  its  Applications

based signature encryption (IBSE) similar to Boyen’s one ([15]) but providing much better security guarantees or into a strongly secure monolithic identity based signcryption

Protected

N/A

19
0
0
2020
Identity  Based  Online/Offline  Signcryption  Scheme

Also, we proposed the first provably secure identity based online/offline signcryption scheme which does not require the knowledge of the message and receiver.. We proved the

Protected

N/A

10
0
0
2020
Signcryption  scheme  for  Identity-based  Cryptosystems

The number of computations for the signature-then-encryption method using Boneh-Franklin ID- based encryption scheme [4] and Hess’s signature scheme [5], and the comparison of the

Protected

N/A

10
0
0
2020
Identity  Based  Public  Verifiable  Signcryption  Scheme

Finally, we have proposed a new identity based signcryption scheme that offers the property of public verifiability and third party verification linking message to the ciphertext and

Protected

N/A

10
0
0
2020
ECGSC:  Elliptic  Curve  based  Generalized  Signcryption  Scheme

ECGSC proposed in this paper has four advantages: (1) based on standard signature ECDSA; (2) is an efficient scheme in computation and communication (storage) cost; (3) is a

Protected

N/A

15
0
0
2020
An  Efficient   and  Provably-Secure  Identity-based  Signcryption  Scheme  for  Multiple  PKGs

Now we show how to design an algorithm F in a chosenmessage and given identity attack to our scheme by running the ESUF-IBSCMP-CMA attacker A that makes qhi queries to random oracles

Protected

N/A

8
0
0
2020
Efficient   and  Forward-Secure  Identity-Based  Signcryption

Unfortunately, the properties of public verifiability and forward security are mutually exclusive in the Libert-Quisquater scheme; in fact, Libert and Quisquater [9] leave it as an

Protected

N/A

14
0
0
2020
A  Multi-Receiver  ID-Based  Generalized  Signcryption  Scheme

In this paper, we give the formal definition and security notions of multi-receiver Id-based generalized signcryption and propose a concrete scheme which needs only one

Protected

N/A

9
0
0
2020
PERFORMANCE INDICATOR DOCUMENTATION

The number of attendees and audience reported reflects somewhat how well the Louisiana State Museum is fulfilling its mission to present exhibits and programming in an educational

Protected

N/A

10
0
0
2021
An  Efficient  Identity-based  Ring  Signcryption  Scheme

signcryption scheme which only takes four pairing operations for any group size, the proposed scheme is proven to be indistinguishable against adaptive chosen

Protected

N/A

14
0
0
2020
Strong  Forward  Security  in  Identity-Based  Signcryption

We show how to transform the binary tree based signcryption scheme to a plain strongly forward secure signcryption scheme with evolving secret keys in Sec.. Last, a third party

Protected

N/A

18
0
0
2020
Provably  Secure  ID-Based  Broadcast  Signcryption (IBBSC)  Scheme

In Advances in Cryptology - CRYPTO ’97: Proceedings of the 17th Annual International Cryptology Conference , volume 1294 of Lecture Notes in Computer Science , pages 165–179.

Protected

N/A

24
0
0
2020

Upload more documents and download any material studies right away!