2018
DOI: 10.1155/2018/1486437
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings

Abstract: With the growing development of Internet technology and popularization of mobile devices, we easily access the Internet anytime and anywhere by mobile devices. It has brought great convenience for our lives. But it brought more challenges than traditional wired communication, such as confidentiality and privacy. In order to improve security and privacy protection in using mobile network, numerous multi-receiver identity-based encryption schemes have been proposed with bilinear pairing and probabilistic hap-to-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…However, in recent years, the multicast communication environment in reality has become more and more complex [8]. In a practical application environment, it often happens that different services need to be provided to different customers, and in this case, the multi-message and multi-receiver signcryption [9], as the further extension of the multi-receiver signcryption [10], comes into being. In a multi-receiver signcryption scheme, the sender is enabled to send the unique and same message to all authorized receivers, while in a multi-message and multi-receiver signcryption scheme, the sender is enabled to send multiple and different messages to different receivers in one logic operation, and each authorized receiver can designcrypt out his/her own plaintext message without exposing the plaintext messages of others.…”
mentioning
confidence: 99%
“…However, in recent years, the multicast communication environment in reality has become more and more complex [8]. In a practical application environment, it often happens that different services need to be provided to different customers, and in this case, the multi-message and multi-receiver signcryption [9], as the further extension of the multi-receiver signcryption [10], comes into being. In a multi-receiver signcryption scheme, the sender is enabled to send the unique and same message to all authorized receivers, while in a multi-message and multi-receiver signcryption scheme, the sender is enabled to send multiple and different messages to different receivers in one logic operation, and each authorized receiver can designcrypt out his/her own plaintext message without exposing the plaintext messages of others.…”
mentioning
confidence: 99%
“…From TABLE 3 and TABLE 4, we can see that our scheme is more efficient than schemes [23], [31], [34]- [37], [41], and [42] in encryption/signcryption process, and it is more efficient than schemes [23], [31], [35], [37], [38], and [41] in decryption/de-signcryption process. However, our scheme is more inefficient than schemes [38] and [39] in encryption/signcryption process, and it is more inefficient than schemes [34], [36], [39], and [42] in decryption/ de-signcryption process, because we have increased some computation to avoid the use of secure channels. Although the computational complexity of our scheme is higher than that of some schemes, the extra calculation costs are considered acceptable when considering the costs spent on maintaining the secure channel, because it is well known that maintaining a secure channel requires a lot in practical applications.…”
Section: A Efficiency Analysismentioning
confidence: 92%
“…To show the advantages of our scheme, we will compare our scheme with schemes [23], [31], [34]- [39], [41] and [42] in terms of computational efficiency and functions, because these schemes are similar to our scheme in functions or cryptographic foundation.…”
Section: Efficiency Analysis and Functional Comparisonmentioning
confidence: 99%
See 2 more Smart Citations