Results 11 to 20 of about 4,167 (184)

SPRA: Scalable policy‐based regulatory architecture for blockchain transactions

open access: yesIET Blockchain, Volume 3, Issue 4, Page 265-282, December 2023., 2023
Most of the current regulatory schemes for blockchain transactions are customized for specific blockchain applications and lack generality and scalability. To address these problems, this paper proposes a scalable policy‐based layered blockchain transaction regulation architecture (SPRA), and also designs a regulatory policy description language (XRPL)
Chuntang Yu   +3 more
wiley   +1 more source

A Lightweight Three‐Party Mutual Authentication Protocol for Internet of Health Things Systems

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
In Internet of Health Things (IoHT) systems, there is a two‐hop network structure between the authentication server TA, Internet of Things Connector (IotC), and wearable sensor (WS). Attackers can use the sensor layer network (the first hop) between the IotC and WS to steal patient’s health‐related information and undermine the security of the system ...
Zhihui Wang   +6 more
wiley   +1 more source

A Novel High‐Efficiency Password Authentication and Key Agreement Protocol for Mobile Client‐Server

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
With the development of wireless technology, people increasingly rely on mobile devices. Since most mobile devices transmit sensitive information via insecure public channels, it is important to design multiauthentication key agreement protocols for security protection.
Xiang Xu   +4 more
wiley   +1 more source

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

[Retracted] FHAAPS: Efficient Anonymous Authentication with Privacy Preservation Scheme for Farm‐to‐Home Communication

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
With the advancement in information and communication technology (ICT), secure farm‐to‐home communication has become an emerging concept. Food is the most basic essential commodity for the survival of human beings which is produced by farmers. However, because of the presence of intermediaries, farmers/producers do not make a sufficient profit and also
Arun Sekar Rajasekaran   +3 more
wiley   +1 more source

Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?

open access: yesJournal of Mathematical Cryptology, 2020
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem.
Delaplace Claire, May Alexander
doaj   +1 more source

Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward‐Curve Digital Signature Algorithm

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security ...
Gauri Shankar   +8 more
wiley   +1 more source

Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2023, Issue 1, 2023., 2023
This paper proposes a blockchain‐based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages.
Lei Wang   +3 more
wiley   +1 more source

Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP

open access: yesCybersecurity, 2023
The elliptic curve discrete logarithm problem (ECDLP) is a popular choice for cryptosystems due to its high level of security. However, with the advent of the extended Shor’s algorithm, there is concern that ECDLP may soon be vulnerable.
Xia Liu, Huan Yang, Li Yang
doaj   +1 more source

Identity-Based Partially Blind Signature Scheme: Cryptanalysis and Construction

open access: yesIEEE Access, 2021
Blind signature is a special type of digital signature, the signer cannot see the specific content signed. However, blindness may cause users to abuse their rights.
Yuhong Jiang, Lunzhi Deng, Bingqin Ning
doaj   +1 more source

Home - About - Disclaimer - Privacy