Results 41 to 50 of about 453 (176)

Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs

open access: yesIEEE Access, 2023
In order to solve security and privacy-preservation issues in VANETs, a number of conditional privacy-preservation schemes based on certificateless signature (CLS) schemes and certificateless aggregate signature (CLAS) schemes have been proposed. However,
Kyung-Ah Shim
doaj   +1 more source

Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza   +3 more
wiley   +1 more source

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection

open access: yesIET Communications, Volume 18, Issue 4, Page 309-321, March 2024.
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin   +6 more
wiley   +1 more source

Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”

open access: yesIEEE Access
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj   +1 more source

An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature

open access: yesComplexity, 2020
With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required ...
Yuanpan Zheng, Guangyu Chen, Liguan Guo
doaj   +1 more source

Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]

open access: yesJisuanji gongcheng, 2017
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj   +1 more source

A lightweight smart contracts framework for blockchain‐based secure communication in smart grid applications

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 3, Page 625-638, February 2024.
This article proposes a blockchain‐based secure communication framework for events monitoring and control in micro renewable energy systems. Abstract Energy is a crucial need in today's world for powering homes, businesses, transportation, and industrial processes.
Muhammad Faheem   +4 more
wiley   +1 more source

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li   +3 more
wiley   +1 more source

Functional Message Authentication Codes With Message and Function Privacy

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs).
Pu Li   +3 more
wiley   +1 more source

Improved certificateless sequential multi-signature scheme

open access: yesTongxin xuebao, 2015
A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

Home - About - Disclaimer - Privacy