Results 11 to 20 of about 671,694 (290)

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

A Novel Identity-Based Privacy-Preserving Anonymous Authentication Scheme for Vehicle-to-Vehicle Communication

open access: yesElektronika ir Elektrotechnika, 2023
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called “NIBPA”.
Yasin Genc   +5 more
doaj   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey

open access: yesCryptography, 2022
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).
Zulianie Binti Jemihin   +2 more
doaj   +1 more source

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

Rapid calculation of R-ate bilinear pairing in China state cryptography standard SM9 [PDF]

open access: yesJisuanji gongcheng, 2019
R-ate is an important bilinear mapping in the Identity-Based Cryptography(IBC) algorithm of China state cryptography standard SM9.Its computational performance is very important to the application of SM9 cryptosystem.To improve the computational ...
GAN Zhiwang,LIAO Fangyuan
doaj   +1 more source

Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits

open access: yesMathematics, 2021
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from.
Marta Bellés-Muñoz   +4 more
doaj   +1 more source

CardioID: Secure ECG-BCG Agnostic Interaction-Free Device Pairing

open access: yesIEEE Access, 2022
Usably secure ad-hoc device pairing fosters connectivity with hardware which is difficult to access (e.g., implanted) and grants convenience for ad-hoc short-term on-off pairing patterns (e.g. shared public domain).
Si Zuo   +5 more
doaj   +1 more source

Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13-310 and BW19-286, sparked interest in the field of public-key cryptography as small sizes of the prime fields.
Yu Dai, Fangguo Zhang, Chang-an Zhao
doaj   +1 more source

An efficient certificateless blind signature scheme without bilinear pairing

open access: yesAnais da Academia Brasileira de Ciências, 2014
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy