2014
DOI: 10.1002/sec.1169
|View full text |Cite
|
Sign up to set email alerts
|

Multi-document threshold signcryption scheme

Abstract: Without proper and well-managed encryption, digital communications interception is technically easy to tap over public networks, and it causes unauthorized disclosure of sensitive information and irreparable harm to individuals as well as organizations. To ensure that digital information remains complete, accessible and secure at all times, it needs to be reliably processed on security measures at both the sending and receiving ends. Signcryption like other aspects of a cryptographic system simultaneously prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…The main contribution of our work not only significantly strengthens the principles of provable security which we give the results of security analysis in Section 4, as pointed out by [21] [27] and [28], including unforgeability, non-repudiation and unlinkability, but also innovatively offers a model for proxy-signature-related or blind-signature-related topics on processing multiple digital messages, as exemplified by [37] [38] and [39]; likewise we provide a high-performance solution through a vast amount of digital messages in terms of computational efficiency in Section 5. Another contribution of this study is to show that a direct implementation of this scheme describes a process where ciphertext from one block encryption step gets intermixed with the shifted data point from the next encryption step until the complete sequence of encoded messages is synthesized as an avalanche effect which we present in Section 3.…”
Section: Introductionmentioning
confidence: 57%
See 1 more Smart Citation
“…The main contribution of our work not only significantly strengthens the principles of provable security which we give the results of security analysis in Section 4, as pointed out by [21] [27] and [28], including unforgeability, non-repudiation and unlinkability, but also innovatively offers a model for proxy-signature-related or blind-signature-related topics on processing multiple digital messages, as exemplified by [37] [38] and [39]; likewise we provide a high-performance solution through a vast amount of digital messages in terms of computational efficiency in Section 5. Another contribution of this study is to show that a direct implementation of this scheme describes a process where ciphertext from one block encryption step gets intermixed with the shifted data point from the next encryption step until the complete sequence of encoded messages is synthesized as an avalanche effect which we present in Section 3.…”
Section: Introductionmentioning
confidence: 57%
“…Additionally, the proposed scheme maintains all message blocks to produce the avalanche effect as more and more blocks connect to the subsequent segment, and this security measure is able to prevent information leakage from occurring in each time period. It is worthwhile pointing out that a newly unveiled multiple-document cryptosystem from Tsai and Su's recent works [38] [39] in 2015 and 2017, respectively. Of these two signcryption techniques, the former presents a different type of a threshold signcryption protocol by assigning a group of signatures to share a secret link for multiple documents and their study handles a large number of digital documents via a group of participants splitting a secret and each of member is allocated a share of the secret, but the latter introduces an alternative paradigm for a blind signcryption model (viz.…”
Section: Introductionmentioning
confidence: 99%
“…We will examine theoretical results of the three different strategies for solving the cryptological operations involved with respect to the costs of computation and communication incurred by each task according to the concept of modular arithmetic operations [31,45]. The notations including scalar multiplication, point addition, hash construction, and modular arithmetic that we used to evaluate the performance are shown in Table 2.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…In the meantime, different participants interact with each other in establishing communication sessions and the session data can leave an identifier stolen more vulnerable to identity theft or protocol attacks (e.g., the man-in-the-middle attack). Moreover, most of the current studies deal with blind signatures in a single message at a time or a batch of multiple signatures on multiple documents [2,30] instead of managing large number of digital documents by making a single signature just once [31]. In the case of handling voluminous amount of documents, gradually performing blind signature processes on multiple electronic documents takes more time than going through the same steps in a single digital document.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation