without pairing for internet of medical things. IEEE
Internet Things J., 10(10):9136–9147.
Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T.,
Nguyen, K., and Vercauteren, F. (2005). Handbook
of elliptic and hyperelliptic curve cryptography. CRC
press.
Cui, B., Lu, W., and He, W. (2022). A new certificateless
signcryption scheme for securing internet of vehicles
in the 5g era. Security and Communication Networks.
Dent, A. W. (2005a). Hybrid signcryption schemes with in-
sider security. In Boyd, C. and Nieto, J. M. G., editors,
Information Security and Privacy, 10th Australasian
Conference, ACISP 2005, Brisbane, Australia, July 4-
6, 2005, Proceedings, volume 3574 of LNCS, pages
253–266. Springer.
Dent, A. W. (2005b). Hybrid signcryption schemes with
outsider security. In Zhou, J., L
´
opez, J., Deng, R. H.,
and Bao, F., editors, Information Security, 8th Inter-
national Conference, ISC 2005, Singapore, Septem-
ber 20-23, 2005, Proceedings, volume 3650 of LNCS,
pages 203–217. Springer.
Gong, B., Wu, Y., Wang, Q., Ren, Y., and Guo, C. (2022).
A secure and lightweight certificateless hybrid sign-
cryption scheme for internet of things. Future Gener.
Comput. Syst., 127:23–30.
Hongzhen, D., Qiaoyan, W., Shanshan, Z., and Mingchu,
G. (2021). A pairing-free certificateless signcryption
scheme for vehicular ad hoc networks. Chinese Jour-
nal of Electronics, 30(5):947–955.
Kasyoka, P. N., Kimwele, M. W., and Mbandu, A. S.
(2021). Efficient certificateless signcryption scheme
for wireless sensor networks in ubiquitous healthcare
systems. Wirel. Pers. Commun., 118(4):3349–3366.
Li, F., Shirase, M., and Takagi, T. (2009). Certificateless
hybrid signcryption. In Bao, F., Li, H., and Wang,
G., editors, Information Security Practice and Expe-
rience, 5th International Conference, ISPEC, Xi’an,
China, April 13-15, 2009, Proceedings, volume 5451
of LNCS, pages 112–123. Springer.
Li, X., Jiang, C., Du, D., Wang, S., Fei, M., and Wu,
L. (2022). A novel efficient signcryption scheme
for resource-constrained smart terminals in cyber-
physical power systems. CoRR, abs/2212.04198.
Malone-Lee, J. (2002). Identity-based signcryption. IACR
Cryptol. ePrint Arch., page 98.
Niu, S., Niu, L., Yang, X., Wang, C., and Jia, X. (2017).
Heterogeneous hybrid signcryption for multi-message
and multi-receiver. PloS one, 12(9):e0184407.
Niu, S., Shao, H., Hu, Y., Zhou, S., and Wang, C. (2022a).
Privacy-preserving mutual heterogeneous signcryp-
tion schemes based on 5g network slicing. IEEE In-
ternet Things J., 9(19):19086–19100.
Niu, S., Zhou, S., Fang, L., Hu, Y., and Wang, C. (2022b).
Broadcast signcryption scheme based on certificate-
less in wireless sensor network. Comput. Networks,
211:108995.
Peng, C., Chen, J., Obaidat, M. S., Vijayakumar, P., and He,
D. (2020). Efficient and provably secure multireceiver
signcryption scheme for multicast communication in
edge computing. IEEE Internet Things J., 7(7):6056–
6068.
Qiu, J., Fan, K., Zhang, K., Pan, Q., Li, H., and Yang, Y.
(2019). An efficient multi-message and multi-receiver
signcryption scheme for heterogeneous smart mobile
iot. IEEE Access, 7:180205–180217.
Selvi, S. S. D., Vivek, S. S., and Rangan, C. P. (2009). Cer-
tificateless KEM and hybrid signcryption schemes re-
visited. IACR Cryptol. ePrint Arch., page 462.
Selvi, S. S. D., Vivek, S. S., Shukla, D., and Rangan,
C. P. (2008). Efficient and provably secure certificate-
less multi-receiver signcryption. In Provable Secu-
rity, Second International Conference, ProvSec 2008,
Shanghai, China, October 30 - November 1, 2008.
Proceedings, volume 5324 of LNCS, pages 52–67.
Springer.
Smart, N. P. (2004). Efficient key encapsulation to multiple
parties. In Blundo, C. and Cimato, S., editors, Se-
curity in Communication Networks, 4th International
Conference, SCN 2004, Amalfi, Italy, September 8-10,
2004, Revised Selected Papers, volume 3352 of LNCS,
pages 208–219. Springer.
Wu, Y., Gong, B., Zhang, Y., et al. (2022). An improved ef-
ficient certificateless hybrid signcryption scheme for
internet of things. Wireless Communications and Mo-
bile Computing, 2022.
Yang, Y., He, D., Vijayakumar, P., Gupta, B. B., and Xie,
Q. (2022). An efficient identity-based aggregate sign-
cryption scheme with blockchain for iot-enabled mar-
itime transportation system. IEEE Trans. Green Com-
mun. Netw., 6(3):1520–1531.
Yin, A. and Liang, H. (2015). Certificateless hybrid
signcryption scheme for secure communication of
wireless sensor networks. Wirel. Pers. Commun.,
80(3):1049–1062.
Yu, X., Zhao, W., and Tang, D. (2022). Efficient and prov-
ably secure multi-receiver signcryption scheme using
implicit certificate in edge computing. J. Syst. Archit.,
126:102457.
Yu, Y., Yang, B., Huang, X., and Zhang, M. (2007). Effi-
cient identity-based signcryption scheme for multiple
receivers. In Autonomic and Trusted Computing, 4th
International Conference, ATC, Hong Kong, China,
July 11-13, 2007, Proceedings, volume 4610 of LNCS,
pages 13–21. Springer.
Zhang, W., Zhang, Y., Guo, C., An, Q., Guo, Y., Liu, X.,
Zhang, S., Huang, J., et al. (2022). Certificateless hy-
brid signcryption by a novel protocol applied to inter-
net of things. Computational Intelligence and Neuro-
science.
Zheng, Y. (1997). Digital signcryption or how to achieve
cost(signature) + cost(encryption). In Advances in
Cryptology - CRYPTO ’97, 17th Annual International
Cryptology Conference, Santa Barbara, California,
USA, August 17-21, 1997, Proceedings, volume 1294
of LNCS, pages 165–179. Springer.
Zhou, C. (2018). Certificateless signcryption scheme with-
out random oracles. Chinese Journal of Electronics,
27:1002–1008.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
744