Results 31 to 40 of about 4,167 (184)
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj +1 more source
Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is absolutely secure. Exposure of private key may lead to disastrous situations in the communication network.
P. Vasudeva Reddy +2 more
doaj +1 more source
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj +1 more source
Pairing-free certificateless blind signature scheme for smart grid
The smart grid is an emerging power system that can realize the information exchange between users and power companies in two-way communication and adjust power companies’ power supply according to the real-time power requests from smart meters on the ...
ShuangGen Liu, Yu Zhu, RuiYun Wang
doaj +1 more source
Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves
This paper presents quantum cryptanalysis for binary elliptic curves from a time-efficient implementation perspective (i.e., reducing the circuit depth), complementing the previous research that focuses on the space-efficiency perspective (i.e., reducing
Dedy Septono Catur Putranto +4 more
doaj +1 more source
SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks [PDF]
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc network. SAnoVS extends our previous work of degree-based clustering algorithms by achieving anonymity and confidentiality of the voting procedure applied ...
Douligeris, C. +2 more
core +1 more source
Web-based Volunteer Computing for Solving the Elliptic Curve Discrete Logarithm Problem
Elliptic curve discrete logarithm problem (ECDLP) is the basis of security of elliptic curve cryptography (ECC). The security evaluation of ECC has been studied by solving an ECDLP.
Shoma Kajitani +6 more
semanticscholar +1 more source
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem [PDF]
In this paper, we describe a new Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. The algorithm depends on a property of the group of rational points of an elliptic curve and is thus not a generic algorithm.
Mahalanobis, Ayan, Mallick, Vivek
core +2 more sources
Topological analysis of number theory and its applications in quantum cryptography [PDF]
This study investigates the application of algebraic topology, in particular homology theory and persistent homology. It includes the analysis of elliptic curves and their use in cryptographic systems and cybersecurity.
Noor Kadhim, Ruaa Abd, Saja AL-Khafaji
doaj +1 more source
Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong +5 more
core +1 more source

