Results 31 to 40 of about 1,315,010 (177)

A New Certificateless Signcryption Scheme for Securing Internet of Vehicles in the 5G Era

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The application of digital signature technology to the Internet of vehicles (IoV) is affected by its network and communication environment. In the 5G era, the influx of a large number of intelligent devices into the mobile Internet requires a low transmission delay and power consumption as well as high‐security requirements.
Beibei Cui, Lu Wei, Wei He, Anwar Ghani
wiley   +1 more source

A Certificateless Anonymous Cross‐Domain Authentication Scheme Assisted by Blockchain for Internet of Vehicles

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
With the development of the Internet of Things and the increase of intelligent vehicles, the Internet of Vehicles (IoVs) have been widely used in the information communication such as road and traffic conditions. However, heavy overhead of certificate management, high computing load of identity and message authentication, and the privacy disclosure of ...
Xueyan Liu   +5 more
wiley   +1 more source

Homomorphic signcryption with public plaintext-result checkability [PDF]

open access: yes, 2021
Signcryption originally proposed by Zheng (CRYPTO \u27 97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Li, Shimin   +3 more
core   +1 more source

A Crowdsourcing Information Obtaining Scheme Aiming at Senior Netizens Based on Blockchain

open access: yesJournal of Sensors, Volume 2022, Issue 1, 2022., 2022
Senior netizens play a unique role in crowdsourcing information obtaining, but the traditional crowdsourcing information obtaining scheme based on intermediary platform cannot satisfy the senior netizens’ strong reliability on anonymity. Malicious intermediary platform may leak out the privacy information of both parties.
Yanlin Qin   +3 more
wiley   +1 more source

[Retracted] Security and Privacy Protection of Internet of Vehicles Consensus Algorithm Based on Wireless Sensors

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
Due to its large network scale, open communication environment, unstable wireless network, and other characteristics, it is extremely vulnerable to attacks and causes security problems, resulting in the collapse of the Internet of Vehicles system. The application of the Internet of Vehicles is becoming more and more extensive, but there are still ...
Yao Zhang, Gaoqing Ji, Rashid A Saeed
wiley   +1 more source

Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]

open access: yesJisuanji kexue
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj   +1 more source

Designated verifier ring signature and ring signcryption

open access: yesInternational Journal of Intelligent Information and Database Systems, 2013
Ring signatures can achieve the anonymity of the users who want to sign documents not only in the authenticated way but also in the confidential way. Based on the k-CAA2 assumption, a security designated verifier ring signature scheme is proposed from bilinear pairing.
Xiaotong Fu, Wen Liu, Ruijun Shi
openaire   +1 more source

Using Identity‐Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E‐Health

open access: yesComputational Intelligence and Neuroscience, Volume 2022, Issue 1, 2022., 2022
Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more effective application at a lower cost in a more satisfactory way.
Shikha Mittal   +8 more
wiley   +1 more source

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]

open access: yes, 2004
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core   +2 more sources

Attribute‐based ring signcryption scheme

open access: yesSecurity and Communication Networks, 2012
ABSTRACTIn this paper, we present attribute‐based ring signcryption scheme, which realizes the concept of ring signcryption in the attribute‐based encryption frame firstly. In our system, it allows a user to signcrypt a message by a set of attributes that are chosen without revealing its identity. In additional, we propose the security models and prove
Zhenzhou Guo, Mingchu Li, Xinxin Fan
openaire   +1 more source

Home - About - Disclaimer - Privacy