Results 21 to 30 of about 4,167 (184)
Efficient Secure Computation from SM Series Cryptography
The wireless network suffers from many security problems, and computation in a wireless network environment may fail to preserve privacy as well as correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure computation ensures the execution security in such an environment, and compared with computation ...
Yibiao Lu +4 more
wiley +1 more source
Securing Topology Control in SDWSNs Using Identity‐Based Cryptography
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang +11 more
wiley +1 more source
The order elliptic curves over finite fields of characteristic two using the Schoof algorithm [PDF]
The elliptic curve cryptosystem is a popular cryptosystem. Its safety depends on the difficulty of the elliptic curve discrete logarithm problem (ECDLP). From the viewpoint of ECDLP, it is very interesting to determine the order of elliptic curves.
Imura, Keigo +2 more
core +1 more source
Secure and Efficient Smart Healthcare System Based on Federated Learning
The rapid development of smart healthcare system in the Internet of Things (IoT) has made the early detection of many chronic diseases more convenient, quick, and economical. However, when healthcare organizations collect users’ health data through deployed IoT devices, there are issues of compromising users’ privacy.
Wei Liu +6 more
wiley +1 more source
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source
Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upon ...
Rolla Subrahmanyam +2 more
doaj +1 more source
Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux +32 more
core +2 more sources
With the widespread adoption of wireless sensor networks (WSN), the security of the WSN has been a wide concern. Certificateless signature eliminates the certificate management problem and key escrow problem and is considered a feasible solution to solve the data integrity and authentication of WSN. Recently, Thumbur et al.
Hong Zhao +4 more
wiley +1 more source
Secure authentication scheme in 6G‐enabled mobile Internet of things for online English education
Abstract In recent years, the mobile Internet of Things (MIoT) for online English education has quickly become an important means and main tool for people to learn and communicate English due it has characteristics and advantages such as high efficiency and no geographical restrictions.
Jiming Yin, Jie Cui
wiley +1 more source
The collection and sharing of electronic health records (EHRs) via the Internet of Things (IoT) can enhance the accuracy of disease diagnosis. However, it is challenging to guarantee the secure search of EHR during the sharing process. The advent of blockchain is a promising solution to address the issues, owing to its remarkable features such as ...
Xueli Nie +5 more
wiley +1 more source

