2022
DOI: 10.1109/access.2022.3165565
|View full text |Cite
|
Sign up to set email alerts
|

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps

Abstract: In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more realistic solution for achieving message confidentiality and authentication simultaneously. However, the security of such schemes is questionable when deployed in modern safety-critical systems, especially as billions of sensitive user information is transmitted over op… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
37
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(39 citation statements)
references
References 47 publications
2
37
0
Order By: Relevance
“…In this section, the efficiency of proposed BVDNP-CSmethod is analyzed withthe above-said metrics using the table and graphical representation. The comparison ismade with the BVDNP-CSmethod and existing methods namely, CGST-FCM [1] and HBRSS [2].…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, the efficiency of proposed BVDNP-CSmethod is analyzed withthe above-said metrics using the table and graphical representation. The comparison ismade with the BVDNP-CSmethod and existing methods namely, CGST-FCM [1] and HBRSS [2].…”
Section: Discussionmentioning
confidence: 99%
“…The dataset istaken from Personal Cloud Datasets: NEC Personal Cloud Trace (http://cloudspaces.eu/results/datasets). Experimental evaluation of proposed DMPPALCS technique and two existing algorithmsnamely Fractional Chaotic Maps (FCM) for Group-oriented Signcryption (CGST) CGST-FCM [1], Homomorphic Block Ring Security System -HBRSS [2] are simulatedusing the different metrics such as execution time, overhead and data confidentiality.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations