The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) 2017
DOI: 10.1109/compsac.2017.20
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 15 publications
0
14
0
Order By: Relevance
“…We adopted a multi-receiver encryption scheme [46,47] with a sign-then-encrypt approach and customized it to aggregate-signcryption with decryption fairness for multiple receivers. The proposed approach avoids the key escrow problem and does not require a certification for public key authentication.…”
Section: State-of-the-artmentioning
confidence: 99%
See 1 more Smart Citation
“…We adopted a multi-receiver encryption scheme [46,47] with a sign-then-encrypt approach and customized it to aggregate-signcryption with decryption fairness for multiple receivers. The proposed approach avoids the key escrow problem and does not require a certification for public key authentication.…”
Section: State-of-the-artmentioning
confidence: 99%
“…In the operational phase, the smart camera uses their private key, the public keys of receiving devices and the public parameters which are already defined by the KGC to execute the signcryption (Figure 3). We adopt the multi-receiver encryption approach [46,47] to perform the signcryption procedure. We then apply aggregation on the cluster head to merge the signcrypted data into a single, compact packet.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…In 2017, Win et al [116] proposed a multi-receiver lightweight encryption scheme for device communications in IoT. Usman et al [117] then proposed a lightweight encryption algorithm named SIT for use in IoT scenarios.…”
Section: Lightweight Encryption Algorithmmentioning
confidence: 99%
“…In order to improve efficiency, the scheme in [26] uses scalar point multiplication operations on elliptic curve cryptography (SPMOOECC), which does not use BPO. Since schemes in [26] can still further improve efficiency, schemes in [27][28][29][30] have been proposed successively. The scheme in [27] used the BPO and map-topoint hash function (MTPHF), scheme in [28] and scheme in [30] used lots of SPMOOECC, and scheme in [29] used BPO in the decryption step, all of which greatly limit the efficiency of the scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Since schemes in [26] can still further improve efficiency, schemes in [27][28][29][30] have been proposed successively. The scheme in [27] used the BPO and map-topoint hash function (MTPHF), scheme in [28] and scheme in [30] used lots of SPMOOECC, and scheme in [29] used BPO in the decryption step, all of which greatly limit the efficiency of the scheme. Among them, schemes in [26][27][28][29][30] have no signature function and cannot resist forgery attacks, and schemes in [25,[27][28][29] did not successfully achieve fair decryption, nor did they implement the verification of part of the private key.…”
Section: Introductionmentioning
confidence: 99%