Results 41 to 50 of about 175 (163)

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Decrypting NTRU: An Introductory Mathematical Exploration of the NTRU Public Key Cryptosystem

open access: yes, 2023
Provides an introductory analysis of the NTRU public key cryptosystem, including the mathematical background in which the system takes place, the specific workings of the system and how to break it, and a comparison to other relevant systems.
openaire   +2 more sources

NTRU Lattice–Based Blockchain Consensus–Assisted Vehicle‐to‐Vehicle Authenticated Message Delivery in Internet of Vehicles

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 8, 25 May 2025.
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav   +3 more
wiley   +1 more source

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU

open access: yesIEEE Access, 2020
NTRU (Number Theory Research Unit) has the characteristics of resistance to quantum computing attacks, fast encryption and decryption, and high security. It is very suitable for wireless confidential data networks and authentication systems.
Neng Zhou   +4 more
doaj   +1 more source

Design of Linkable Ring Signature Scheme Based on the MP‐LWE Problem and Its Application in IoV

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle‐product learning with errors (MP‐LWE) problem and applies it to vehicular ...
Lansheng Han   +3 more
wiley   +1 more source

A Lattice-Based Group Authentication Scheme

open access: yesApplied Sciences, 2018
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms.
Jheng-Jia Huang   +3 more
doaj   +1 more source

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Home - About - Disclaimer - Privacy