2020
DOI: 10.1109/tdsc.2018.2857775
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 25 publications
1
20
0
Order By: Relevance
“…Table 3 show the comparison based on the computational cost for signing stage and the verification stage. It has seen from Table 3 that the proposed scheme is efficient in signing stage in comparison with He et al [45], and Zhang et al [47]. It has also seen from Table 3 that the schemes Shen et al [44], and Ramadan et al [46] performing better than the proposed scheme in signing stage.…”
Section: Comparison Anaysismentioning
confidence: 71%
See 2 more Smart Citations
“…Table 3 show the comparison based on the computational cost for signing stage and the verification stage. It has seen from Table 3 that the proposed scheme is efficient in signing stage in comparison with He et al [45], and Zhang et al [47]. It has also seen from Table 3 that the schemes Shen et al [44], and Ramadan et al [46] performing better than the proposed scheme in signing stage.…”
Section: Comparison Anaysismentioning
confidence: 71%
“…We evaluated the performance of our SSS scheme over the existing schemes presented in Shen et al [44] scheme, He et al [45] scheme, Ramadan et al [46] scheme, and Zhang et al [47] scheme. The comparison has been done based on the computational cost of these methods.…”
Section: Comparison Anaysismentioning
confidence: 99%
See 1 more Smart Citation
“…Digital signature based on asymmetric cryptography is generally used for transaction authentication in an untrustworthy environment ( Feng, He, Liu, Wang, Choo, 2020 , He, Zhang, Wang, Choo, 2018 ). Blockchain uses asymmetric cryptography mechanism to send transactions and verify the authentication of transactions.…”
Section: Introductionmentioning
confidence: 99%
“…Due to its advantages of good scalability and no certificate management, typical identity-based cryptography-based (IBC) schemes, such as Hess's and 8 Cha and Cheon's works, 9 have been improved and applied for static TIoT. [10][11][12][13][14] However, they are unable to provide efficient authentication during dynamic and wide coverage circumstances.…”
Section: Introductionmentioning
confidence: 99%