Security flaw of an ECC-based signcryption scheme with anonymity

被引:0
|
作者
School of Computer Science and Engineering, University of Electronic Science and Technology of China, No. 4, North Jianshe Road, Chenghua District, Chengdu, Sichuan, 610054, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Int. J. Netw. Secur. | 2013年 / 4卷 / 317-320期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
26
引用
收藏
相关论文
共 50 条
  • [1] Ring signature scheme for ECC-based anonymous signcryption
    Chung, Yu Fang
    Wu, Zhen Yu
    Chen, Tzer Shyong
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 669 - 674
  • [2] An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents
    Tsai, Chien-Hua
    Su, Pin-Chang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [3] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428
  • [4] ECC-Based Certificateless Aggregate Signcryption Scheme in Cyber-Physical Power Systems
    Li, Xue
    Zhu, Renqing
    Du, Dajun
    Jiang, Cheng
    Zhou, Zhe
    [J]. IEEE SYSTEMS JOURNAL, 2024, 18 (02): : 893 - 904
  • [5] Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
    Hussain, Sajid
    Chaudhry, Shehzad Ashraf
    Alomari, Osama Ahmad
    Alsharif, Mohammed H.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 4431 - 4438
  • [6] Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 292 - 293
  • [7] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [8] An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS
    Chandrakar, Preeti
    Om, Hari
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (08)
  • [9] A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) : 1732 - 1751
  • [10] An Anonymous and Efficient ECC-Based Authentication Scheme for SIP
    Zhou, Yousheng
    Chen, Xinyun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):