Results 21 to 30 of about 632 (158)
With the fast development of Industrial Internet of Things (IIoT), IIoT storage, which provides a lower cost, higher reliability of data, remote access services, and expandable storage space, is received much attention among enterprises and individual ...
Tsu-Yang Wu +3 more
doaj +1 more source
Lattice-Based Revocable Certificateless Signature
Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization ...
Hung, Ying-Hao +2 more
openaire +1 more source
Certificateless Generalized Signcryption
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encryption and signature in a single operation, but also provide encryption or signature model alone when needed. This paper proposed a formal definition of certificateless generalized signcryption(CLGSC), then provide the security model of CLGSC.
Ji, Huifang, Han, Wenbao, Zhao, Long
openaire +1 more source
An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds
Autonomous vehicular clouds, as the combination of cloud computing and conventional vehicular ad hoc networks, will provide abundant resources and services by sharing under-utilized resources of future high-end vehicles such as computing power, storage ...
Congcong Li +5 more
doaj +1 more source
LIMA: Local and Lightweight Mutual Authentication for VANETs
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi +2 more
wiley +1 more source
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang +3 more
doaj +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
Timed-Release Certificateless Encryption [PDF]
Timed-Release Encryption(TRE) is an encryption mechanism that allows a receiver to decrypt a ciphertext only after the time that a sender designates. In this paper, we propose the notion of Timed-Release Certificateless Encryption(TRCLE), and define its security models.
Toru Oshikiri, Taiichi Saito
openaire +1 more source
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam +4 more
wiley +1 more source
Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang +8 more
wiley +1 more source

