Yasmine Abouelseoud

Learn More
In this paper, a new identity-based proxy signcryption scheme is presented. The proposed scheme allows partial delegation of signing rights. Consequently, a signature created by the proxy signer is distinguishable from that created by the principal signer. This level of security is a common requirement in many applications to prevent malicious proxy agents(More)
This paper presents a new approach for secure hiding of textual data in a colored digital image. Use of images as a cover media in steganography is based on the deficiencies in the human visual system (HVS). The proposed technique employs two independent chaotic sequences for specifying the locations where the message bits are embedded in the cover image(More)
In this paper, a new blind identity-based signature scheme with message recovery based on bilinear pairings on elliptic curves is presented. The work is motivated by the importance of blind signatures as a cryptographic primitive essential in protocols that guarantee anonymity of users. This is particularly of interest in DRM systems, electronic cash(More)
  • 1