Results 51 to 60 of about 1,761 (191)
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj +1 more source
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order
Ang Yang +3 more
doaj +1 more source
Patients go to multiple healthcare providers for treatment, and their health data is generally distributed among providers. The distributed health data and the decentralized health care system structure make it ideal for blockchain-based health ...
Manjunath Hegde +2 more
doaj +1 more source
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core +2 more sources
MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications
This paper presents the Metaverse Off‐chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized systems that supports code or stored data updates without changing on‐chain data. It significantly reduces overhead compared to directly storing data within a smart contract. ABSTRACT Blockchain has evolved into a secure and
Chenxi Xiong, Ting Yang, Gang Mao
wiley +1 more source
Lightweight Authentication Scheme for Resource‐Constrained Devices in IIoT
An authentication scheme leveraging elliptic curve cryptography (ECC) and lightweight cryptography was proposed. This scheme is designed to facilitate secure communication among IIoT devices while minimizing resource usage. ABSTRACT The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource ...
Zhong Cao +4 more
wiley +1 more source
Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upon ...
Rolla Subrahmanyam +2 more
doaj +1 more source
Abstract The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications.
Shitharth Selvarajan +5 more
wiley +1 more source
Group structure of elliptic curves over ℤ/Nℤ
We characterize the possible groups E(Z∕NZ)E\left({\mathbb{Z}}/N{\mathbb{Z}}) arising from elliptic curves over Z∕NZ{\mathbb{Z}}/N{\mathbb{Z}} in terms of the groups E(Fp)E\left({{\mathbb{F}}}_{p}), with pp varying among the prime divisors of NN.
Sala Massimiliano, Taufer Daniele
doaj +1 more source
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj +1 more source

