Post-quantum-inspired scalable blockchain architecture for internet hospital systems with lightweight privacy-preserving access control. [PDF]
Hao L +5 more
europepmc +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations. [PDF]
Zheng M +5 more
europepmc +1 more source
Research on Development Progress and Test Evaluation of Post-Quantum Cryptography. [PDF]
Zhang M +6 more
europepmc +1 more source
Hardware Acceleration-Based Privacy-Aware Authentication Scheme for Internet of Vehicles Using Physical Unclonable Function. [PDF]
Madububa Mbachu U +6 more
europepmc +1 more source
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
openaire
Related searches:
Certificateless Public Key Cryptography in the Standard Model
Fundamenta Informaticae, 2018Identity-based cryptography has been introduced by Shamir at Crypto’84 to avoid the use of expensive certificates in certified public key cryptography. In such system, the identity becomes the public key and each user needs to interact with a designated authority to obtain the related private key.
Canard, Sébastien, Trinh, Viet Cuong
openaire +1 more source
Design and Implementation of Certificateless Cryptography for IoT Applications
2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS), 2023This work introduces a cryptographic module for IoT devices that addresses the security vulnerabilities that come with their widespread adoption. Four core cryptographic mod- ules are implemented, including data confidentiality, message integrity, authentication, and secure communication channels.
Fares, Neam, Wang, Bo, Bakiras, Spiridon
openaire +1 more source

