Results 21 to 30 of about 632 (158)

Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments

open access: yesIEEE Access, 2019
With the fast development of Industrial Internet of Things (IIoT), IIoT storage, which provides a lower cost, higher reliability of data, remote access services, and expandable storage space, is received much attention among enterprises and individual ...
Tsu-Yang Wu   +3 more
doaj   +1 more source

Lattice-Based Revocable Certificateless Signature

open access: yesSymmetry, 2017
Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization ...
Hung, Ying-Hao   +2 more
openaire   +1 more source

Certificateless Generalized Signcryption

open access: yesPhysics Procedia, 2012
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encryption and signature in a single operation, but also provide encryption or signature model alone when needed. This paper proposed a formal definition of certificateless generalized signcryption(CLGSC), then provide the security model of CLGSC.
Ji, Huifang, Han, Wenbao, Zhao, Long
openaire   +1 more source

An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds

open access: yesSensors, 2018
Autonomous vehicular clouds, as the combination of cloud computing and conventional vehicular ad hoc networks, will provide abundant resources and services by sharing under-utilized resources of future high-end vehicles such as computing power, storage ...
Congcong Li   +5 more
doaj   +1 more source

LIMA: Local and Lightweight Mutual Authentication for VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi   +2 more
wiley   +1 more source

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments

open access: yesIEEE Access, 2018
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang   +3 more
doaj   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Timed-Release Certificateless Encryption [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2015
Timed-Release Encryption(TRE) is an encryption mechanism that allows a receiver to decrypt a ciphertext only after the time that a sender designates. In this paper, we propose the notion of Timed-Release Certificateless Encryption(TRCLE), and define its security models.
Toru Oshikiri, Taiichi Saito
openaire   +1 more source

Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam   +4 more
wiley   +1 more source

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, Volume 12, Issue 27, July 17, 2025.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy