Results 31 to 40 of about 1,315,010 (177)
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles in the 5G Era
The application of digital signature technology to the Internet of vehicles (IoV) is affected by its network and communication environment. In the 5G era, the influx of a large number of intelligent devices into the mobile Internet requires a low transmission delay and power consumption as well as high‐security requirements.
Beibei Cui, Lu Wei, Wei He, Anwar Ghani
wiley +1 more source
With the development of the Internet of Things and the increase of intelligent vehicles, the Internet of Vehicles (IoVs) have been widely used in the information communication such as road and traffic conditions. However, heavy overhead of certificate management, high computing load of identity and message authentication, and the privacy disclosure of ...
Xueyan Liu +5 more
wiley +1 more source
Homomorphic signcryption with public plaintext-result checkability [PDF]
Signcryption originally proposed by Zheng (CRYPTO \u27 97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Li, Shimin +3 more
core +1 more source
A Crowdsourcing Information Obtaining Scheme Aiming at Senior Netizens Based on Blockchain
Senior netizens play a unique role in crowdsourcing information obtaining, but the traditional crowdsourcing information obtaining scheme based on intermediary platform cannot satisfy the senior netizens’ strong reliability on anonymity. Malicious intermediary platform may leak out the privacy information of both parties.
Yanlin Qin +3 more
wiley +1 more source
Due to its large network scale, open communication environment, unstable wireless network, and other characteristics, it is extremely vulnerable to attacks and causes security problems, resulting in the collapse of the Internet of Vehicles system. The application of the Internet of Vehicles is becoming more and more extensive, but there are still ...
Yao Zhang, Gaoqing Ji, Rashid A Saeed
wiley +1 more source
Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj +1 more source
Designated verifier ring signature and ring signcryption
Ring signatures can achieve the anonymity of the users who want to sign documents not only in the authenticated way but also in the confidential way. Based on the k-CAA2 assumption, a security designated verifier ring signature scheme is proposed from bilinear pairing.
Xiaotong Fu, Wen Liu, Ruijun Shi
openaire +1 more source
Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more effective application at a lower cost in a more satisfactory way.
Shikha Mittal +8 more
wiley +1 more source
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core +2 more sources
Attribute‐based ring signcryption scheme
ABSTRACTIn this paper, we present attribute‐based ring signcryption scheme, which realizes the concept of ring signcryption in the attribute‐based encryption frame firstly. In our system, it allows a user to signcrypt a message by a set of attributes that are chosen without revealing its identity. In additional, we propose the security models and prove
Zhenzhou Guo, Mingchu Li, Xinxin Fan
openaire +1 more source

