Results 1 to 10 of about 30,753 (229)

Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X [PDF]

open access: yesSensors, 2021
5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critical ...
Shimaa A. Abdel Hakeem, HyungWon Kim
doaj   +2 more sources

Searchable Encryption Scheme Based on China State Cryptography Standard SM9 [PDF]

open access: yesJisuanji gongcheng, 2022
To meet the requirements of the security level of ciphertext data, existing identity-based Searchable Encryption(SE) schemes use symmetric bilinear pairing with a considerable number of security parameters for many times, which results in a reduced ...
ZHANG Chao, PENG Changgen, DING Hongfa, XU Dequan
doaj   +1 more source

Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
This paper presents a novel robust solution for key management, message encryption, and authentication, offering enhanced security for 5G-V2X communication.
Shimaa A. Abdel Hakeem, Hyungwon Kim
doaj   +1 more source

Implementation of Boneh - Lynn - Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves

open access: yesVietnam Journal of Science, Technology and Engineering, 2022
One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient ...
Nhu-Quynh Luc   +2 more
doaj   +1 more source

Bilinear cryptography using Lie algebras from p-groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Pairings are particular bilinear maps, and they have been defined based on elliptic curves whichare abelian groups. In cryptography and security problems use these pairings. Mrabet et al. proposedpairings from a tensor product of groups in 2013.
Elaheh Khamseh
doaj   +1 more source

Rapid calculation of R-ate bilinear pairing in China state cryptography standard SM9 [PDF]

open access: yesJisuanji gongcheng, 2019
R-ate is an important bilinear mapping in the Identity-Based Cryptography(IBC) algorithm of China state cryptography standard SM9.Its computational performance is very important to the application of SM9 cryptosystem.To improve the computational ...
GAN Zhiwang,LIAO Fangyuan
doaj   +1 more source

Short Proxy Signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2017
In order to avoid network congestion,and reduce the data flow,based on bilinear mapping,this paper proposes short proxy signature scheme with only one group element,including the signature definition,the construction of new scheme and the security ...
HUANG Rufen,HUANG Zhenjie,CHEN Qunshan,NONG Qiang
doaj   +1 more source

Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]

open access: yesJisuanji gongcheng, 2020
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj   +1 more source

A Novel Identity-Based Privacy-Preserving Anonymous Authentication Scheme for Vehicle-to-Vehicle Communication

open access: yesElektronika ir Elektrotechnika, 2023
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called “NIBPA”.
Yasin Genc   +5 more
doaj   +1 more source

An efficient certificateless blind signature scheme without bilinear pairing

open access: yesAnais da Academia Brasileira de Ciências, 2014
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy