2018
DOI: 10.1007/978-981-10-8639-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Signcrypting the Group Signature with Non-transitive Proxy Re-encryption in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…This value can be obtained by computing the message using oneway hash functions, and sending it to the recipient to assure the integrity of the received message. Using this process, we can add the sender's private key to the one-way hash function to maintain the integrity of the message and ensure non-repudiation [59]- [61]. A recipient can verify that the signer actually sent the message by undertaking the same computation with the signer's public key instead of the private key.…”
Section: ) Signing the Encrypted Message For Authenticated Encryptionmentioning
confidence: 99%
“…This value can be obtained by computing the message using oneway hash functions, and sending it to the recipient to assure the integrity of the received message. Using this process, we can add the sender's private key to the one-way hash function to maintain the integrity of the message and ensure non-repudiation [59]- [61]. A recipient can verify that the signer actually sent the message by undertaking the same computation with the signer's public key instead of the private key.…”
Section: ) Signing the Encrypted Message For Authenticated Encryptionmentioning
confidence: 99%