Results 21 to 30 of about 1,761 (191)

Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]

open access: yes, 2017
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux   +32 more
core   +2 more sources

Securing Topology Control in SDWSNs Using Identity‐Based Cryptography

open access: yesJournal of Sensors, Volume 2023, Issue 1, 2023., 2023
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang   +11 more
wiley   +1 more source

Identity-Based Partially Blind Signature Scheme: Cryptanalysis and Construction

open access: yesIEEE Access, 2021
Blind signature is a special type of digital signature, the signer cannot see the specific content signed. However, blindness may cause users to abuse their rights.
Yuhong Jiang, Lunzhi Deng, Bingqin Ning
doaj   +1 more source

SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks [PDF]

open access: yes, 2013
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc network. SAnoVS extends our previous work of degree-based clustering algorithms by achieving anonymity and confidentiality of the voting procedure applied ...
Douligeris, C.   +2 more
core   +1 more source

Secure and Efficient Smart Healthcare System Based on Federated Learning

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
The rapid development of smart healthcare system in the Internet of Things (IoT) has made the early detection of many chronic diseases more convenient, quick, and economical. However, when healthcare organizations collect users’ health data through deployed IoT devices, there are issues of compromising users’ privacy.
Wei Liu   +6 more
wiley   +1 more source

Radio Frequency Identification Mutual Authentication Protocol Based on Elliptic Curve Cryptography [PDF]

open access: yesJisuanji gongcheng, 2017
Aiming at wireless communication security problem of Radio Frequency Identification(RFID) the based on Elliptic Curve Cryptography(ECC) algorithm,this paper proposes a RFID mutual authentication protocol.It describes in detail the process of the new ...
LIU Boya,LIU Nianyi,YANG Yatao,LI Zichen
doaj   +1 more source

An Efficient Pairing‐Free Certificateless Signature Scheme with KGC Trust Level 3 for Wireless Sensor Network

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
With the widespread adoption of wireless sensor networks (WSN), the security of the WSN has been a wide concern. Certificateless signature eliminates the certificate management problem and key escrow problem and is considered a feasible solution to solve the data integrity and authentication of WSN. Recently, Thumbur et al.
Hong Zhao   +4 more
wiley   +1 more source

Secure authentication scheme in 6G‐enabled mobile Internet of things for online English education

open access: yesIET Networks, Volume 11, Issue 5, Page 182-194, September 2022., 2022
Abstract In recent years, the mobile Internet of Things (MIoT) for online English education has quickly become an important means and main tool for people to learn and communicate English due it has characteristics and advantages such as high efficiency and no geographical restrictions.
Jiming Yin, Jie Cui
wiley   +1 more source

New Blind Muti-signature Schemes based on ECDLP [PDF]

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2018
In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. Blind signatures are considered the most important solutions to meeting these requirements. Many studies have focused on blind signature schemes; however, most of the studied schemes are single blind ...
Duc Nguyen Tan   +3 more
openaire   +1 more source

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy