Results 21 to 30 of about 5,707 (192)

Adaptor signature scheme based on ISRSAC digital signature algorithm

open access: yesTongxin xuebao, 2023
The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA ...
Yanshuo ZHANG   +3 more
doaj   +2 more sources

Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology

open access: yesIEEE Access, 2020
Electronic medical data have significant advantages over paper-based patient records when it comes to storage and retrieval. However, most existing medical data sharing schemes have security risks, such as being prone to data tampering and forgery, and ...
Xiaodong Yang   +4 more
doaj   +1 more source

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

Provably Unforgeable Signatures [PDF]

open access: yes, 2007
Very strong definitions of security for signature schemes have been proposed in the literature. Constructions for such schemes have been proposed, but so far they have only been of theoretical interest and have been considered far too inefficient for practical use.Here we present a new scheme that satisfies these strongest definitions and uses ...
Jurjen N. E. Bos, David Chaum
openaire   +1 more source

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

open access: yesSensors, 2018
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based
Hongfei Zhu   +5 more
doaj   +1 more source

A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing [PDF]

open access: yes, 2015
To ensure the privacy of users in transport systems, researchers are working on new protocols providing the best security guarantees while respecting functional requirements of transport operators.
Arfaoui, Ghada   +5 more
core   +6 more sources

Incremental Unforgeable Encryption [PDF]

open access: yes, 2002
The recent selection of the AES block cipher to replace DES has generated interest in developing new modes of operation to supplement the modes defined as part of the DES standard [1,16,23]. We initiate the study of modes of encryption which are both incremental and unforgeable, and point out a number of applications for modes meeting these ...
Enrico Buonanno   +2 more
openaire   +1 more source

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [PDF]

open access: yes, 2015
Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or ...
C Olston   +6 more
core   +3 more sources

Two-Round Multi-Signatures from Okamoto Signatures

open access: yesMathematics, 2023
Multi-signatures (MS) are a special type of public-key signature (PKS) in which multiple signers participate cooperatively to generate a signature for a single message. Recently, applications that use an MS scheme to strengthen the security of blockchain
Kwangsu Lee, Hyoseung Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy