Results 61 to 70 of about 3,702 (204)

Hierarchical certificateless authenticated key agreement protocol

open access: yesTongxin xuebao, 2016
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj  

Certificateless Proxy Re-encryption Scheme for Cloud Computing Security [PDF]

open access: yesJisuanji gongcheng, 2017
This paper researches Proxy Re-encryption(PRE) technology under the Certificateless Public Key Cryptography(CL-PKC),gives a formal definition and security model for certificateless PRE system and construct a new certificateless PRE scheme.The new scheme ...
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei
doaj   +1 more source

Security-Mediated Certificateless Cryptography [PDF]

open access: yes, 2006
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has been used in all previous mediated cryptography algorithms. We provide a model of security
Chow, Sherman   +2 more
openaire   +2 more sources

Certificateless Blind Signature Based on DLP [PDF]

open access: yes, 2015
The most widely used digital signature in the real word application such as e cash e-voting etc. is blind signature. Previously the proposed blind signature follow the foot steps of public key cryptography(PKC) but conventional public key cryptography ...
Kumar, Samir
core  

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Scheme on user identity attribute preserving based on ring signcryption for cloud computing

open access: yesTongxin xuebao, 2014
Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which ...
Shuan-bao LI   +5 more
doaj  

Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring

open access: yesIET Wireless Sensor Systems, Volume 14, Issue 6, Page 363-380, December 2024.
This study presents a novel Digital Twin (DT) framework for remote healthcare monitoring, integrating edge computing with robust cybersecurity measures to enhance patient care. By employing advanced encryption, threat prediction, and secure communication protocols, we demonstrate a substantial improvement in data transmission security and efficiency ...
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function

open access: yesIEEE Access, 2019
As an important method of making democratic decisions, voting has always been a topic of social concern. Compared with the traditional, e-voting is widely used in various decision scenarios because of the convenience, easy to participate and low cost ...
Shiyao Gao   +4 more
doaj   +1 more source

Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza   +3 more
wiley   +1 more source

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection

open access: yesIET Communications, Volume 18, Issue 4, Page 309-321, March 2024.
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy