Results 1 to 10 of about 1,315,010 (177)
Lattice-based ring signcryption for consortium blockchain
Ring signcryption with no group administrator satisfies the decentralization and blockchain anonymity. In this article, we construct new lattice-based ring signcryption scheme suitable for consortium blockchain (CB-LRSCS), in which the smart contract ...
Huifang Yu, Zhirui Lv
doaj +5 more sources
A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles [PDF]
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications.
Insaf Ullah +6 more
doaj +5 more sources
Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL [PDF]
Blockchain-based cold chain logistics (BCCL) systems establish a new logistics data-sharing mechanism with blockchain technology, which destroys the traditional data island problem and promotes cross-institutional data interoperability. However, security
Yang Zhang +4 more
doaj +4 more sources
A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity. [PDF]
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating ...
Liaojun Pang +4 more
doaj +2 more sources
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara +3 more
doaj +2 more sources
With the rapid increase in smart grid users and the increasing cost of user data transmission, proposing an encryption method that does not increase the construction cost while increasing the user ceiling has become the focus of many scholars.
Hongna Song +5 more
doaj +2 more sources
A Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems
The evolving paradigm of private edge computing seamlessly incorporates the more extensive functionalities of cloud computing with localized processing.
Muhammad Asghar Khan +6 more
doaj +2 more sources
Electronic Reporting Using SM2-Based Ring Signcryption
Electronic whistleblowing systems are widely used due to their efficiency and convenience. The key to designing such systems lies in protecting the identity privacy of whistleblowers, preventing malicious whistleblowing, and ensuring the confidentiality of whistleblowing information. To address these issues, a SM2 traceable ring signcryption scheme for
Yu, Huifang, Jie, Jiaxing, Li, Lei
openaire +3 more sources
A Traceable Ring Signcryption Scheme Based on SM9 for Privacy Protection
To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a ...
Liang Qiao, Xuefeng Zhang, Beibei Li
doaj +2 more sources
Post-quantum Secure Hybrid Ring Signcryption Scheme from Lattice Assumption [PDF]
The signcryption tag-KEM/DEM construction is naturally extended to the ring signcryption in this paper. The security model of hybrid ring signcryption which is constructed by ring signcryption tag-KEM/DEM is given in this paper. A hybrid ring signcryption from lattice theory is proposed which satisfies anonymity and identity authenticity.
FengHe Wang, CHunxiao Wang
openaire +2 more sources

