2017 3rd International Conference on Big Data Computing and Communications (BIGCOM) 2017
DOI: 10.1109/bigcom.2017.51
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Signcryption Schemes Based on Hyper Elliptic Curve

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 12 publications
0
19
0
Order By: Relevance
“…The symbols CFY, UFY, A ARA, FSY, PVY, ROM, FVTA, √ , and ⨵ indicate confidentiality, unforgeability, authen integrity, anti-replay attack, forward secrecy, public verifiability, random oracle model verification through AVISPA, satisfying the service, and does not satisfy, respectively. The is clearly shown that, our proposed CB-SN meet all the claimed security services and the s i.e., Li et al [22], Omala et al [15], Gao et al [24], Braeken et al [17], Braeken et al [19] Sche and 3 do not meet the services such as FSY and PVY, as well as FVTA or some other verificat t + 1) 2 (2) Note, ℎ points are different from elliptic curve [26]. It forms the divisors which are the formal sum of finite integers like = ∑ i i, where i ℑ and i ℎ .…”
Section: Security Performancementioning
confidence: 94%
See 2 more Smart Citations
“…The symbols CFY, UFY, A ARA, FSY, PVY, ROM, FVTA, √ , and ⨵ indicate confidentiality, unforgeability, authen integrity, anti-replay attack, forward secrecy, public verifiability, random oracle model verification through AVISPA, satisfying the service, and does not satisfy, respectively. The is clearly shown that, our proposed CB-SN meet all the claimed security services and the s i.e., Li et al [22], Omala et al [15], Gao et al [24], Braeken et al [17], Braeken et al [19] Sche and 3 do not meet the services such as FSY and PVY, as well as FVTA or some other verificat t + 1) 2 (2) Note, ℎ points are different from elliptic curve [26]. It forms the divisors which are the formal sum of finite integers like = ∑ i i, where i ℑ and i ℎ .…”
Section: Security Performancementioning
confidence: 94%
“…Note, h points are different from elliptic curve [26]. It forms the divisors which are the formal sum of finite integers like = ∑ i i , where i ℑ t and i h .…”
Section: Hyper-elliptic Curvementioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the point cannot form a group like points. The hyper elliptic curve forms an Abelian group [15] called a Jacobian group ( ), and the order ( ( )) of the Jacobian as…”
Section: A Hyper Elliptic Curvementioning
confidence: 99%
“…Many efforts are made to develop lightweight cryptography algorithms along with higher security [3]. In communication systems encryption is already deployed as standard on the data link layer.…”
Section: Lightweight Cryptography Algorithmsmentioning
confidence: 99%