2017
DOI: 10.1007/978-3-319-68542-7_18
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(23 citation statements)
references
References 16 publications
0
23
0
Order By: Relevance
“…We do not consider other less time-consuming operations, such as the XOR operation. For the fairness of comparison, we extend schemes in [23,25,26] to n senders sending n messages to a receiver in Tables 2 and 3. Since other schemes in [23,26] only provide one-way heterogeneous communication, the comparisons are divided into PKI→IBC in Table 2 and IBC→PKI in Table 3 just for more scientific and elaborate results.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…We do not consider other less time-consuming operations, such as the XOR operation. For the fairness of comparison, we extend schemes in [23,25,26] to n senders sending n messages to a receiver in Tables 2 and 3. Since other schemes in [23,26] only provide one-way heterogeneous communication, the comparisons are divided into PKI→IBC in Table 2 and IBC→PKI in Table 3 just for more scientific and elaborate results.…”
Section: Discussionmentioning
confidence: 99%
“…From Tables 2 and 3, we can see our MOHSC-I and MOHSC-II schemes require a smaller total computation time (the sum of PKI setup, IBC setup, signcryption, and unsigncryption) when n messages are involved. The more intuitive analyses are given in Figures 3 and 4 for schemes in [23,25,26] and our schemes. We implement the experiment on MICA2 platform (same as [24]).…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations