Results 11 to 20 of about 4,167 (184)
SPRA: Scalable policy‐based regulatory architecture for blockchain transactions
Most of the current regulatory schemes for blockchain transactions are customized for specific blockchain applications and lack generality and scalability. To address these problems, this paper proposes a scalable policy‐based layered blockchain transaction regulation architecture (SPRA), and also designs a regulatory policy description language (XRPL)
Chuntang Yu +3 more
wiley +1 more source
A Lightweight Three‐Party Mutual Authentication Protocol for Internet of Health Things Systems
In Internet of Health Things (IoHT) systems, there is a two‐hop network structure between the authentication server TA, Internet of Things Connector (IotC), and wearable sensor (WS). Attackers can use the sensor layer network (the first hop) between the IotC and WS to steal patient’s health‐related information and undermine the security of the system ...
Zhihui Wang +6 more
wiley +1 more source
A Novel High‐Efficiency Password Authentication and Key Agreement Protocol for Mobile Client‐Server
With the development of wireless technology, people increasingly rely on mobile devices. Since most mobile devices transmit sensitive information via insecure public channels, it is important to design multiauthentication key agreement protocols for security protection.
Xiang Xu +4 more
wiley +1 more source
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj +1 more source
With the advancement in information and communication technology (ICT), secure farm‐to‐home communication has become an emerging concept. Food is the most basic essential commodity for the survival of human beings which is produced by farmers. However, because of the presence of intermediaries, farmers/producers do not make a sufficient profit and also
Arun Sekar Rajasekaran +3 more
wiley +1 more source
Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem.
Delaplace Claire, May Alexander
doaj +1 more source
At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security ...
Gauri Shankar +8 more
wiley +1 more source
This paper proposes a blockchain‐based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages.
Lei Wang +3 more
wiley +1 more source
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
The elliptic curve discrete logarithm problem (ECDLP) is a popular choice for cryptosystems due to its high level of security. However, with the advent of the extended Shor’s algorithm, there is concern that ECDLP may soon be vulnerable.
Xia Liu, Huan Yang, Li Yang
doaj +1 more source
Identity-Based Partially Blind Signature Scheme: Cryptanalysis and Construction
Blind signature is a special type of digital signature, the signer cannot see the specific content signed. However, blindness may cause users to abuse their rights.
Yuhong Jiang, Lunzhi Deng, Bingqin Ning
doaj +1 more source

