Results 21 to 30 of about 5,816 (214)
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security.
Saeed Ullah Jan, Habib Ullah Khan
doaj +1 more source
Quantum Tokens for Digital Signatures [PDF]
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three quantum signing tokens and his classical public key. The
Ben-David, Shalev, Sattath, Or
core +2 more sources
Quantum-secure message authentication via blind-unforgeability
37 pages, v4: Erratum added.
Gorjan Alagic +3 more
openalex +3 more sources
A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions
Attribute-based signature (ABS) assures the verifier that the message is endorsed by a signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide identity authentication with privacy preservation in scenarios like ...
Jialu Hao +5 more
doaj +1 more source
Fair payments for privacy-preserving aggregation of mobile crowdsensing data
With the advent of mobile crowdsensing, the mobile devices equipped with a variety of sensors (such as accelerometer, gyroscope, microphone etc.) are used to collect sensory data.
Mallikarjun Reddy Dorsala +2 more
doaj +1 more source
Improving Security of Existentially Unforgeable Signature Schemes [PDF]
In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed.
Mariusz Jurkiewicz
openalex +2 more sources
Adaptor signature scheme based on ISRSAC digital signature algorithm
The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA ...
Yanshuo ZHANG +3 more
doaj +2 more sources
Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology
Electronic medical data have significant advantages over paper-based patient records when it comes to storage and retrieval. However, most existing medical data sharing schemes have security risks, such as being prone to data tampering and forgery, and ...
Xiaodong Yang +4 more
doaj +1 more source
Signcryption schemes with threshold unsigncryption, and applications [PDF]
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier +2 more
core +2 more sources
One of the earliest cryptographic applications of quantum information was to create quantum digital cash that could not be counterfeited. In this paper, we describe a new type of quantum money: quantum coins, where all coins of the same denomination are ...
Mosca, Michele, Stebila, Douglas
core +3 more sources

