Results 51 to 60 of about 1,535 (180)

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

An Efficient Certificateless Aggregate Signature Scheme Without Pairings for Healthcare Wireless Sensor Network

open access: yesIEEE Access, 2019
Wireless sensor network (WSN) can be widely used in the field of health care since it has many advantages, such as low cost, high efficiency, low latency, and so on.
Hongzhen Du, Qiaoyan Wen, Shanshan Zhang
doaj   +1 more source

Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent

open access: yesIEEE Access, 2020
Certificateless public key cryptography (CL-PKC) not only eliminates the need for certificates in traditional certificate-based PKC but also solves the inherent key escrow problem in identity-based PKC.
Mingxin Ma   +4 more
doaj   +1 more source

Cross-domain Identity Authentication Scheme in Cloud Based on Certificateless Signature [PDF]

open access: yesJisuanji gongcheng, 2017
In view of the shortcoming of failure in cross-domain anonymous authentication scheme based on certificateless public key cryptography,a cross-domain authentication scheme in cloud environment is proposed by using bilinear mapping.On the basis of the ...
YANG Xiaodong,AN Faying,YANG Ping,LIU Tingting,WANG Caifen
doaj   +1 more source

Certificateless Blind Signature Based on DLP [PDF]

open access: yes, 2015
The most widely used digital signature in the real word application such as e cash e-voting etc. is blind signature. Previously the proposed blind signature follow the foot steps of public key cryptography(PKC) but conventional public key cryptography ...
Kumar, Samir
core  

Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam   +4 more
wiley   +1 more source

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, Volume 12, Issue 27, July 17, 2025.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Certificateless signature scheme without bilinear pairings

open access: yesTongxin xuebao, 2012
To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key ...
Sheng-bao WANG, Wen-hao LIU, Qi XIE
doaj   +2 more sources

Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme

open access: yesSensors, 2023
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time.
Insaf Ullah   +5 more
doaj   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Home - About - Disclaimer - Privacy