Results 1 to 10 of about 1,315,010 (177)

Lattice-based ring signcryption for consortium blockchain

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Ring signcryption with no group administrator satisfies the decentralization and blockchain anonymity. In this article, we construct new lattice-based ring signcryption scheme suitable for consortium blockchain (CB-LRSCS), in which the smart contract ...
Huifang Yu, Zhirui Lv
doaj   +5 more sources

A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles [PDF]

open access: yesMicromachines, 2022
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications.
Insaf Ullah   +6 more
doaj   +5 more sources

Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL [PDF]

open access: yesEntropy
Blockchain-based cold chain logistics (BCCL) systems establish a new logistics data-sharing mechanism with blockchain technology, which destroys the traditional data island problem and promotes cross-institutional data interoperability. However, security
Yang Zhang   +4 more
doaj   +4 more sources

A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity. [PDF]

open access: yesPLoS ONE, 2016
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating ...
Liaojun Pang   +4 more
doaj   +2 more sources

A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]

open access: yesSensors
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara   +3 more
doaj   +2 more sources

A Privacy Protection Scheme of Certificateless Aggregate Ring Signcryption Based on SM2 Algorithm in Smart Grid

open access: yesMathematics
With the rapid increase in smart grid users and the increasing cost of user data transmission, proposing an encryption method that does not increase the construction cost while increasing the user ceiling has become the focus of many scholars.
Hongna Song   +5 more
doaj   +2 more sources

A Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems

open access: yesIEEE Access
The evolving paradigm of private edge computing seamlessly incorporates the more extensive functionalities of cloud computing with localized processing.
Muhammad Asghar Khan   +6 more
doaj   +2 more sources

Electronic Reporting Using SM2-Based Ring Signcryption

open access: yesarXiv.org
Electronic whistleblowing systems are widely used due to their efficiency and convenience. The key to designing such systems lies in protecting the identity privacy of whistleblowers, preventing malicious whistleblowing, and ensuring the confidentiality of whistleblowing information. To address these issues, a SM2 traceable ring signcryption scheme for
Yu, Huifang, Jie, Jiaxing, Li, Lei
openaire   +3 more sources

A Traceable Ring Signcryption Scheme Based on SM9 for Privacy Protection

open access: yesInformation
To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a ...
Liang Qiao, Xuefeng Zhang, Beibei Li
doaj   +2 more sources

Post-quantum Secure Hybrid Ring Signcryption Scheme from Lattice Assumption [PDF]

open access: yesProceedings of the 2015 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering, 2015
The signcryption tag-KEM/DEM construction is naturally extended to the ring signcryption in this paper. The security model of hybrid ring signcryption which is constructed by ring signcryption tag-KEM/DEM is given in this paper. A hybrid ring signcryption from lattice theory is proposed which satisfies anonymity and identity authenticity.
FengHe Wang, CHunxiao Wang
openaire   +2 more sources

Home - About - Disclaimer - Privacy