Results 51 to 60 of about 1,761 (191)

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

open access: yesThe Scientific World Journal, 2014
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order
Ang Yang   +3 more
doaj   +1 more source

DDMIA: Distributed Dynamic Mutual Identity Authentication for Referrals in Blockchain-Based Health Care Networks

open access: yesIEEE Access, 2022
Patients go to multiple healthcare providers for treatment, and their health data is generally distributed among providers. The distributed health data and the decentralized health care system structure make it ideal for blockchain-based health ...
Manjunath Hegde   +2 more
doaj   +1 more source

Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve

open access: yes, 2008
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core   +2 more sources

MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This paper presents the Metaverse Off‐chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized systems that supports code or stored data updates without changing on‐chain data. It significantly reduces overhead compared to directly storing data within a smart contract. ABSTRACT Blockchain has evolved into a secure and
Chenxi Xiong, Ting Yang, Gang Mao
wiley   +1 more source

Lightweight Authentication Scheme for Resource‐Constrained Devices in IIoT

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
An authentication scheme leveraging elliptic curve cryptography (ECC) and lightweight cryptography was proposed. This scheme is designed to facilitate secure communication among IIoT devices while minimizing resource usage. ABSTRACT The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource ...
Zhong Cao   +4 more
wiley   +1 more source

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

open access: yesIEEE Access, 2023
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upon ...
Rolla Subrahmanyam   +2 more
doaj   +1 more source

A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications.
Shitharth Selvarajan   +5 more
wiley   +1 more source

Group structure of elliptic curves over ℤ/Nℤ

open access: yesJournal of Mathematical Cryptology
We characterize the possible groups E(Z∕NZ)E\left({\mathbb{Z}}/N{\mathbb{Z}}) arising from elliptic curves over Z∕NZ{\mathbb{Z}}/N{\mathbb{Z}} in terms of the groups E(Fp)E\left({{\mathbb{F}}}_{p}), with pp varying among the prime divisors of NN.
Sala Massimiliano, Taufer Daniele
doaj   +1 more source

Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing

open access: yesElektronika ir Elektrotechnika, 2020
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj   +1 more source

Home - About - Disclaimer - Privacy