http://fcst.ceaj.org/CN/10.3778/j.issn.1673-9418.2104074 WebIdentity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps. Hao Wang, Zhen Liu, Zhe Liu, and Duncan S. Wong. Frontiers of Computer Science 10(4): 741-754 (2016). Time-Domain Attribute-based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach. Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin …
Cost-Effective Proxy Signcryption Scheme for Internet of Things - Hindawi
WebSep 19, 2024 · The recent advances in the Internet of Things (IoT) and wireless network applications required lightweight encryption and authentication algorithms in order to secure the communications among the distributed resources. While various mechanisms have been proposed in the cryptography, signcryption has been recognized as a suitable technique … trulia fitchburg wi
新的具有隐私保护功能的异构聚合签密方案
WebOct 13, 2024 · Based on our construction, we define and construct a ring signcryption scheme in Section 5. We conclude the paper in Section 6. 2. The definition and security models of signcryption with key privacy. A signcryption scheme is a quadruple of probabilistic polynomial time (PPT) al-gorithms (Keygen, Signcrypt, De-signcrypt, Verify). … WebThen, the server may send the derived signcryption c f,y to Bob. Bob using his secret key s k R together with Alice's public key p k S can obtain the message y.Given the pair (y, c f,y), anyone can check with the public verification key v k that the server correctly applied f to the dataset by verifying that c f,y is a valid signcryption on a given triple “ w e i g h t ”, f (m ⃗), 〈 … WebDec 3, 2011 · A modified signcryption with proxy re-encryption scheme is proposed which provides public verifiable property in a way that any third party can verify the validity, and a certified e-mail protocol in id-based setting with semi-trusted third party is presented to reduce the trust extent of third party, and improve the efficiency and practice. … trulia for danbury wisconsin