Results 1 to 10 of about 30,753 (229)
Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X [PDF]
5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critical ...
Shimaa A. Abdel Hakeem, HyungWon Kim
doaj +2 more sources
Searchable Encryption Scheme Based on China State Cryptography Standard SM9 [PDF]
To meet the requirements of the security level of ciphertext data, existing identity-based Searchable Encryption(SE) schemes use symmetric bilinear pairing with a considerable number of security parameters for many times, which results in a reduced ...
ZHANG Chao, PENG Changgen, DING Hongfa, XU Dequan
doaj +1 more source
This paper presents a novel robust solution for key management, message encryption, and authentication, offering enhanced security for 5G-V2X communication.
Shimaa A. Abdel Hakeem, Hyungwon Kim
doaj +1 more source
One option for a digital signature solution for devices with low memory and low bandwidth transmission over channels uses a short digital signature scheme based on Weil bilinear pairing aimed at short processing times, fast computation, and convenient ...
Nhu-Quynh Luc +2 more
doaj +1 more source
Bilinear cryptography using Lie algebras from p-groups [PDF]
Pairings are particular bilinear maps, and they have been defined based on elliptic curves whichare abelian groups. In cryptography and security problems use these pairings. Mrabet et al. proposedpairings from a tensor product of groups in 2013.
Elaheh Khamseh
doaj +1 more source
Rapid calculation of R-ate bilinear pairing in China state cryptography standard SM9 [PDF]
R-ate is an important bilinear mapping in the Identity-Based Cryptography(IBC) algorithm of China state cryptography standard SM9.Its computational performance is very important to the application of SM9 cryptosystem.To improve the computational ...
GAN Zhiwang,LIAO Fangyuan
doaj +1 more source
Short Proxy Signature Scheme with Provable Security [PDF]
In order to avoid network congestion,and reduce the data flow,based on bilinear mapping,this paper proposes short proxy signature scheme with only one group element,including the signature definition,the construction of new scheme and the security ...
HUANG Rufen,HUANG Zhenjie,CHEN Qunshan,NONG Qiang
doaj +1 more source
Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj +1 more source
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called “NIBPA”.
Yasin Genc +5 more
doaj +1 more source
An efficient certificateless blind signature scheme without bilinear pairing
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG +3 more
doaj +1 more source

