Results 11 to 20 of about 696,470 (284)

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +5 more sources

Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system

open access: yesConnection Science, 2022
Internet of Things (IoT) devices require lower power consumption with higher security, which can be achieved by using lightweight cryptography (LWC) approaches. Attribute-based encryption (ABE) provides a fine-grained access control policy over encrypted
Mounika Jammula   +2 more
doaj   +5 more sources

Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography. [PDF]

open access: yesPLoS ONE
In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers ...
Rui Ma, Linyue Du
doaj   +6 more sources

Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey

open access: yesCryptography, 2022
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).
Zulianie Binti Jemihin   +2 more
doaj   +2 more sources

I2PA: An Efficient ABC for IoT [PDF]

open access: yesCryptography, 2019
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography.
Ibou Sene   +2 more
doaj   +6 more sources

Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices

open access: yesIEEE Access, 2022
Attribute-based encryption is useful for one-to-many encrypted message sending. However, most attribute-based encryption schemes authorize and issue attributes to users by a single authority.
Er-Shuo Zhuang, Chun-I Fan, I-Hua Kuo
doaj   +2 more sources

Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography

open access: yesInternational Journal Software Engineering and Computer Science (IJSECS)
Due to the drastic growth, the Internet of Things (IoT) has become an inevitable form of human life. However, IoT communication is subjected to a vast range of security breaches in the vulnerable environment, which leads to the demand for appropriate technology security issues in IoT communication. The cryptography technique exhibits effective security
Adel Abidullah   +3 more
openaire   +2 more sources

Q-ECS: Quantum-Enhanced Cloud Security with Attribute-based Cryptography and Quantum Key Distribution

open access: yesQuantum Information Processing
Abstract In the contemporary landscape of advanced technological ecosystems, the ubiquity of cloud computing serves as a cornerstone for orchestrating and maintaining a myriad of global datasets, information repositories, and service infrastructures.
Umer Nauman   +3 more
semanticscholar   +3 more sources

Efficient and Secure Data Sharing Using Attribute-based Cryptography

open access: yes, 2018
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di- namiche, spinge molti possessori di tali dati a immagazzinarli su server nel cloud, anche al fine di condividerli con terze parti. La condivisione di dati su server (possibilmente) non fidati fonte di importanti e non banali questioni riguardanti sicurezza, privacy ...
M. Sepehri
openaire   +3 more sources

Home - About - Disclaimer - Privacy