2022
DOI: 10.1016/j.sysarc.2022.102457
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Li and Pang [33] declared that Niu et al's scheme [32] could not really achieve receiver anonymity because of the fixed Lagrange interpolation polynomial results. Then, Pang et al [34] devised an efficient MRCLSC scheme without bilinear pairing, while Yu et al [35] substantiated that Pang's et al scheme [34] could not achieve unforgeability and confidentiality, as the adversary can randomly forge the public and private key pairs of users. Yu et al [35] also found that the schemes in [36][37][38] could not ensure the integrity of transmitted data.…”
Section: Certificateless Signcryption Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Li and Pang [33] declared that Niu et al's scheme [32] could not really achieve receiver anonymity because of the fixed Lagrange interpolation polynomial results. Then, Pang et al [34] devised an efficient MRCLSC scheme without bilinear pairing, while Yu et al [35] substantiated that Pang's et al scheme [34] could not achieve unforgeability and confidentiality, as the adversary can randomly forge the public and private key pairs of users. Yu et al [35] also found that the schemes in [36][37][38] could not ensure the integrity of transmitted data.…”
Section: Certificateless Signcryption Schemesmentioning
confidence: 99%
“…Then, Pang et al [34] devised an efficient MRCLSC scheme without bilinear pairing, while Yu et al [35] substantiated that Pang's et al scheme [34] could not achieve unforgeability and confidentiality, as the adversary can randomly forge the public and private key pairs of users. Yu et al [35] also found that the schemes in [36][37][38] could not ensure the integrity of transmitted data. Considering the secure data transmission of wireless body area networks, Shen et al [7] proposed a lightweight MRCLSC scheme.…”
Section: Certificateless Signcryption Schemesmentioning
confidence: 99%
“…Based on bilinear pairing groups, several PKI-MRSC schemes [22], [23] were proposed. For achieving better performance, several efficient PKI-MRSC schemes [24]- [27] based on elliptic curve or hyperelliptic curve cryptography have been proposed. Moreover, Wang et al [11] proposed a PKI-AMRSC scheme to combine privacypreserving property into the original PKI-MRSC scheme.…”
Section: A Evolution Of Mrsc and Amrsc Schemesmentioning
confidence: 99%
“…Table 1 lists the comparisons among the proposed PKI-LR-AMRSC scheme with PKI-MRSC, PKI-AMRSC, ID-AMRSC and CL-AMRSC schemes [11], [27], [39], [44] in terms of the public-key setting, the cost of multi-signcryption algorithm, the cost of unsigncryption algorithm, recipient anonymity, the ability of withstanding side-channel attacks, and leakage-unbounded property. For recipients of the schemes in [11], [27], [39], [44], a sender computes a key k r by using each recipient ID r 's public key (for r=1, 2, . .…”
Section: Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation