Results 1 to 10 of about 10,318 (256)
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings [PDF]
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang +4 more
doaj +2 more sources
Electronic voting protocol from bilinear pairings
Electronic voting has been an active research area since two decades, which involves using information systems and cryptographic schemes in order to reduce costs and human mistakes as well as increase process speed, without discard its security.
Gina Gallegos García +2 more
doaj +2 more sources
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core +2 more sources
Certificateless signature scheme without bilinear pairings
To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key ...
Sheng-bao WANG, Wen-hao LIU, Qi XIE
doaj +3 more sources
Bilinear cryptography using Lie algebras from p-groups [PDF]
Pairings are particular bilinear maps, and they have been defined based on elliptic curves whichare abelian groups. In cryptography and security problems use these pairings. Mrabet et al. proposedpairings from a tensor product of groups in 2013.
Elaheh Khamseh
doaj +1 more source
The review on elliptic curves as cryptographic pairing groups [PDF]
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj +1 more source
Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security [PDF]
The dynamic searchable encryption process is vulnerable to file injection attacks and information abuseattacks caused by information leakage.Furthermore, the existing dynamic searchable encryption schemes based on public key cryptosystem often involve a ...
DING Xiaohui, CAO Suzhen, WANG Caifen
doaj +1 more source
ID-based, Proxy, Threshold Signature Scheme [PDF]
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała +3 more
doaj +1 more source
Perception Layer Lightweight Certificateless Authentication Scheme for IoT-Based Emergency Logistics
Emergency logistics is of great significance for supply security in emergencies. As a crucial component of strategic material reserve and allocation, emergency logistics is characterized by high levels of safety and efficacy.
Jianxi Yang, Jinpo Fan, Xiaochen Zhu
doaj +1 more source
A New Short Signature Scheme with Random Oracle from Bilinear Pairings
In this paper, we propose a new and efficient short signature scheme from the bilinear pairings. Our scheme is constructed by bilinear inverse-square Diffie-Hellman problem (BISDHP) and does not require any special hash function.
Sedat Akleylek +3 more
doaj +1 more source

