A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols [PDF]
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and ...
Gao, Fei +3 more
core +1 more source
Ensuring Security and Privacy in VANET: A Comprehensive Survey of Authentication Approaches
Vehicular ad hoc networks (VANET) are revolutionizing intelligent transportation systems (ITS), and as a result, research on their security is becoming increasingly important. As the primary security concern for VANET, authentication security is still quite difficult to achieve.
Soujanya B K +2 more
wiley +1 more source
Performance and Security Evaluations of Identity-and Pairing-based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, McCullagh and Quisquater, and Paterson and Schuldt [PDF]
Bilinear pairing, an essential tool to construct-efficient digital signatures, has applications in mobile devices and other applications. One particular research challenge is to design cross-platform security protocols (e.g.
Choo, Kim-Kwang Raymond +4 more
core +2 more sources
Enhancing Security in Smart Renewable Energy Grids Through Proxy Signcryption Approach
The rapid development of smart renewable energy grids (SREGs) has resulted in a vast amount of data that requires efficient access control and secure mechanisms for sharing energy records among stakeholders. This paper proposes a novel approach called the identity‐based proxy signcryption‐based scheme for SREGs (ID‐PSC‐SREGs), which ensures the secure ...
Rachana Y. Patil +5 more
wiley +1 more source
Leveled Fully Homomorphic Signcryption From Lattices
With the continuous and rapid development of Cloud Computing, Big Data and Internet of Things, it is extremely critical to protect data with homomorphism, privacy and integrity. For this, Rezaeibagha et al.
Xiaodan Jin +4 more
doaj +1 more source
An example of proving UC-realization with formal methods [PDF]
In the universal composability framework we consider ideal functionalities for secure messaging and signcryption. Using traditional formal methods techniques we show that the secure messaging functionality can be UC-realized by a hybrid protocol that ...
Andova, S. +4 more
core +2 more sources
Development of Time-Stamped Signcryption Scheme and its Application in E-Cash System [PDF]
A signcryption scheme combining public key encryptions and digital signatures in one logical step can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation and with a cost significantly lower ...
Baral, Sanjib Kumar, Dash, Sourav
core
Multi-dimensional key generation of ICMetrics for cloud computing [PDF]
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa +3 more
core +2 more sources
Traceable attribute‐based signcryption [PDF]
ABSTRACTSigncryption can provide confidentiality and authenticity for many cryptographic applications. In this study, we propose a new efficient attribute‐based signcryption scheme. This scheme achieves confidentiality against chosen ciphertext attacks and unforgeability against chosen messages attacks in the selective attribute model. In addition, our
Jianghong Wei, Xuexian Hu, Wenfen Liu
openaire +1 more source

