Results 51 to 60 of about 632 (158)

A lightweight smart contracts framework for blockchain‐based secure communication in smart grid applications

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 3, Page 625-638, February 2024.
This article proposes a blockchain‐based secure communication framework for events monitoring and control in micro renewable energy systems. Abstract Energy is a crucial need in today's world for powering homes, businesses, transportation, and industrial processes.
Muhammad Faheem   +4 more
wiley   +1 more source

A Revocable Certificateless Signature Scheme [PDF]

open access: yesJournal of Computers, 2014
Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, how to revoke a user in certificateless cryptosystem still remains a problem: the existing solutions are not practical for use due to either a costly mediator or enormous computation (secret
Yinxia Sun, Futai Zhang, Limin Shen
openaire   +1 more source

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li   +3 more
wiley   +1 more source

Certificateless Provable Data Possession Scheme for Cloud-Based Electronic Health Records System

open access: yesMathematics
Electronic Health Records (EHRs: digital compilations of patient health status and diagnosis) are typically shared, analyzed, and stored on cloud servers.
Yujie Wu, Xiao Tan, Qi Xie
doaj   +1 more source

Functional Message Authentication Codes With Message and Function Privacy

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs).
Pu Li   +3 more
wiley   +1 more source

An Efficient Elliptic Curve Cryptography‐Based Secure Communication with Privacy Preserving for Autonomous Vehicle

open access: yesJournal of Advanced Transportation, Volume 2024, Issue 1, 2024.
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao   +5 more
wiley   +1 more source

A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification

open access: yesIEEE Access
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information of ...
Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu
doaj   +1 more source

Certificateless Linkable Ring Signature Scheme

open access: yesIEEE Access, 2020
Ring signature is an anonymous signature that both authenticates the message and protects the identity information of the signer. It is suitable for scenarios such as anonymous network access, online auctions, etc. However, there is a problem in a regular ring signature scheme.
Lunzhi Deng, Hongyu Shi, Yan Gao
openaire   +2 more sources

An Elliptic Curve Menezes–Qu–Vanston‐Based Authentication and Encryption Protocol for IoT

open access: yesWireless Communications and Mobile Computing, Volume 2024, Issue 1, 2024.
The exponential growth of the Internet of Things (IoT) has led to a surge in data generation, critical for business decisions. Ensuring data authenticity and integrity over unsecured channels is vital, especially due to potential catastrophic consequences of tampered data.
Susovan Chanda   +5 more
wiley   +1 more source

Fully Secure Lightweight Certificateless Signature Scheme for IIoT

open access: yesIEEE Access, 2019
In recent years, Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. Inevitably, security for IIoT has become a priority in order to deploy secure applications.
Fatemeh Rezaeibagha   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy