Results 11 to 20 of about 696,470 (284)
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj +5 more sources
Internet of Things (IoT) devices require lower power consumption with higher security, which can be achieved by using lightweight cryptography (LWC) approaches. Attribute-based encryption (ABE) provides a fine-grained access control policy over encrypted
Mounika Jammula +2 more
doaj +5 more sources
Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography. [PDF]
In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers ...
Rui Ma, Linyue Du
doaj +6 more sources
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).
Zulianie Binti Jemihin +2 more
doaj +2 more sources
I2PA: An Efficient ABC for IoT [PDF]
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography.
Ibou Sene +2 more
doaj +6 more sources
Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices
Attribute-based encryption is useful for one-to-many encrypted message sending. However, most attribute-based encryption schemes authorize and issue attributes to users by a single authority.
Er-Shuo Zhuang, Chun-I Fan, I-Hua Kuo
doaj +2 more sources
Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography
Due to the drastic growth, the Internet of Things (IoT) has become an inevitable form of human life. However, IoT communication is subjected to a vast range of security breaches in the vulnerable environment, which leads to the demand for appropriate technology security issues in IoT communication. The cryptography technique exhibits effective security
Adel Abidullah +3 more
openaire +2 more sources
Abstract In the contemporary landscape of advanced technological ecosystems, the ubiquity of cloud computing serves as a cornerstone for orchestrating and maintaining a myriad of global datasets, information repositories, and service infrastructures.
Umer Nauman +3 more
semanticscholar +3 more sources
Efficient and Secure Data Sharing Using Attribute-based Cryptography
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di- namiche, spinge molti possessori di tali dati a immagazzinarli su server nel cloud, anche al fine di condividerli con terze parti. La condivisione di dati su server (possibilmente) non fidati fonte di importanti e non banali questioni riguardanti sicurezza, privacy ...
M. Sepehri
openaire +3 more sources

