Results 31 to 40 of about 4,167 (184)

Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram

open access: yesIEEE Access, 2022
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj   +1 more source

Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is absolutely secure. Exposure of private key may lead to disastrous situations in the communication network.
P. Vasudeva Reddy   +2 more
doaj   +1 more source

Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing

open access: yesElektronika ir Elektrotechnika, 2020
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj   +1 more source

Pairing-free certificateless blind signature scheme for smart grid

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
The smart grid is an emerging power system that can realize the information exchange between users and power companies in two-way communication and adjust power companies’ power supply according to the real-time power requests from smart meters on the ...
ShuangGen Liu, Yu Zhu, RuiYun Wang
doaj   +1 more source

Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves

open access: yesIEEE Access, 2023
This paper presents quantum cryptanalysis for binary elliptic curves from a time-efficient implementation perspective (i.e., reducing the circuit depth), complementing the previous research that focuses on the space-efficiency perspective (i.e., reducing
Dedy Septono Catur Putranto   +4 more
doaj   +1 more source

SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks [PDF]

open access: yes, 2013
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc network. SAnoVS extends our previous work of degree-based clustering algorithms by achieving anonymity and confidentiality of the voting procedure applied ...
Douligeris, C.   +2 more
core   +1 more source

Web-based Volunteer Computing for Solving the Elliptic Curve Discrete Logarithm Problem

open access: yesInternational Journal of Networking and Computing, 2016
Elliptic curve discrete logarithm problem (ECDLP) is the basis of security of elliptic curve cryptography (ECC). The security evaluation of ECC has been studied by solving an ECDLP.
Shoma Kajitani   +6 more
semanticscholar   +1 more source

A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem [PDF]

open access: yes, 2018
In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points of an elliptic curve and is thus not a generic algorithm.
Mahalanobis, Ayan, Mallick, Vivek
core   +2 more sources

Topological analysis of number theory and its applications in quantum cryptography [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة
This study investigates the application of algebraic topology, in particular homology theory and persistent homology. It includes the analysis of elliptic curves and their use in cryptographic systems and cybersecurity.
Noor Kadhim, Ruaa Abd, Saja AL-Khafaji
doaj   +1 more source

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy