Results 61 to 70 of about 423 (151)

An anonymous authentication and key establish scheme for smart grid: FAuth [PDF]

open access: yes, 2017
The smart meters in electricity grids enable fine-grained consumption monitoring. Thus, suppliers could adjust their tariffs. However, as smart meters are deployed within the smart grid field, authentication and key establishment between smart grid ...
Castillejo Parrilla, Pedro   +3 more
core   +2 more sources

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Multimodal Medical Imaging Security using Hybridization of Honey Encryption Algorithm with Binary Particle Swarm Optimization [PDF]

open access: yes, 2021
Transmitting and receiving information through any network requires some sort of security. One of the major application requires data security is Medical Imaging System. Especially, for owning any significant information about patient details.
et. al., Jayahari Prabhu G,
core   +1 more source

New Convertible Authenticated Encryption Scheme with Message Linkages [PDF]

open access: yes, 2015
The digital signature provides the signing message with functions like authentication, integration and non-repudiation. However, in some of the applications, the signature has to be verified only by specific recipients of the message and it ...
Rout, Dhananjay, Subramanyam, K S
core  

Identity-Based Blind Signature Scheme with Message Recovery [PDF]

open access: yes, 2017
Blind signature allows a user to obtain a signature on a message without revealing anything about the message to the signer. Blind signatures play an important role in many real world applications such as e-voting, e-cash system where anonymity is of ...
Gowri, T.   +3 more
core   +3 more sources

Proxy Blind Signature using Hyperelliptic Curve Cryptography [PDF]

open access: yes, 2013
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins and should also be mimicked electronically. A user has to fulll above two properties of blind signature for permission to
Pradhan, Srikanta
core  

Efficient Generalized Signcryption Schemes [PDF]

open access: yes, 2010
Generalized signcryption is a new cryptographic primitive which works as a signcryption scheme, a signature scheme and an encryption scheme as per need. Recently Ji et al.
Prashant Kushwah, Sunder Lal
core  

Secure Multiple Group Data Deduplication in Cloud Data Storage [PDF]

open access: yes, 2018
埼玉大学博士(学術)xvii, 112 p.With the tremendous growth of available digital data, the use of Cloud Service Providers are gaining much popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking ...
29503, EI, MON CHO, イ, モン チョ
core   +1 more source

A Generic Construction of Identity-Based Online/Offline Signcryption

open access: yes2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Signcryption has clear advantage over traditional sign-then-encrypt schemes. However, the computational overhead for signcryption is still too heavy when it is applied to resource-constraint systems. In this paper, we propose a generic construction of the identity-based online/offline signcryption, where most of computations are carried out when the ...
Dongdong Sun, Yi Mu, Willy Susilo
openaire   +2 more sources

An Improved Certificateless Generalized Signcryption Scheme [PDF]

open access: yes, 2013
Signcryption is basically a cryptographic primitive which provides both signature and encryption functions simultaneously, but it is not useful when only one of the function is required. Generalized Signcryption (GSC) is a special cryptographic primitive
Rout, Jitendra Kumar
core  

Home - About - Disclaimer - Privacy