2022
DOI: 10.1109/tii.2022.3142306
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless Aggregated Signcryption Scheme (CLASS) for Cloud-Fog Centric Industry 4.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…The security features of the relevant representative schemes (i.e., Wang et al [13], Zhang et al [25], Basudan et al [27], and Dohare et al [29]) are compared as shown in Table 2, proving that our scheme's security surpasses those of the others. The symbol √…”
Section: Security Analysismentioning
confidence: 82%
“…The security features of the relevant representative schemes (i.e., Wang et al [13], Zhang et al [25], Basudan et al [27], and Dohare et al [29]) are compared as shown in Table 2, proving that our scheme's security surpasses those of the others. The symbol √…”
Section: Security Analysismentioning
confidence: 82%
“…Computational efficiency analysis: in order to specifically analyze this scheme, a comparative analysis will be performed on ring signcryption with existing papers [3,23,27,28] and existing literature on aggregated signcryption papers [29][30][31][32], respectively. Suppose a ring has n members and m messages.…”
Section: Performance Analysismentioning
confidence: 99%
“…In this section, we will select typical excellent papers [3,23,[27][28][29][30][31][32] that are currently available and compare them. The main focus of attention is on the functionality of the programs and the problems they solve.…”
Section: Compare Algorithm Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…It forms a distributed database by using digital signature, encryption technology, hash function, and timestamp [18]. Blockchain assigns the responsibility of maintaining privacy and security to all entities in VANET instead of centralized operation [19][20][21][22]. In addition, identity-based signcryption protocol has shorter ciphertext and less computational overhead, which can sign and encrypt the data to ensure the confidentiality and nonrepudiation of the information [23][24][25].…”
Section: Introductionmentioning
confidence: 99%