Results 1 to 10 of about 10,318 (256)

A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings [PDF]

open access: yesSensors, 2020
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang   +4 more
doaj   +2 more sources

Electronic voting protocol from bilinear pairings

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2013
Electronic voting has been an active research area since two decades, which involves using information systems and cryptographic schemes in order to reduce costs and human mistakes as well as increase process speed, without discard its security.
Gina Gallegos García   +2 more
doaj   +2 more sources

Identity based cryptography from bilinear pairings [PDF]

open access: yes, 2005
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core   +2 more sources

Certificateless signature scheme without bilinear pairings

open access: yesTongxin xuebao, 2012
To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key ...
Sheng-bao WANG, Wen-hao LIU, Qi XIE
doaj   +3 more sources

Bilinear cryptography using Lie algebras from p-groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Pairings are particular bilinear maps, and they have been defined based on elliptic curves whichare abelian groups. In cryptography and security problems use these pairings. Mrabet et al. proposedpairings from a tensor product of groups in 2013.
Elaheh Khamseh
doaj   +1 more source

The review on elliptic curves as cryptographic pairing groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj   +1 more source

Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security [PDF]

open access: yesJisuanji gongcheng, 2022
The dynamic searchable encryption process is vulnerable to file injection attacks and information abuseattacks caused by information leakage.Furthermore, the existing dynamic searchable encryption schemes based on public key cryptosystem often involve a ...
DING Xiaohui, CAO Suzhen, WANG Caifen
doaj   +1 more source

ID-based, Proxy, Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała   +3 more
doaj   +1 more source

Perception Layer Lightweight Certificateless Authentication Scheme for IoT-Based Emergency Logistics

open access: yesIEEE Access, 2023
Emergency logistics is of great significance for supply security in emergencies. As a crucial component of strategic material reserve and allocation, emergency logistics is characterized by high levels of safety and efficacy.
Jianxi Yang, Jinpo Fan, Xiaochen Zhu
doaj   +1 more source

A New Short Signature Scheme with Random Oracle from Bilinear Pairings

open access: yesJournal of Telecommunications and Information Technology, 2023
In this paper, we propose a new and efficient short signature scheme from the bilinear pairings. Our scheme is constructed by bilinear inverse-square Diffie-Hellman problem (BISDHP) and does not require any special hash function.
Sedat Akleylek   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy