Results 41 to 50 of about 5,816 (214)

PUDA - Privacy and Unforgeability for Data Aggregation [PDF]

open access: yes, 2015
Existing work on secure data collection and secure aggregation is mainly focused on confidentiality issues. That is, ensuring that the untrusted Aggregator learns only the aggregation result without divulging individual data inputs. In this paper however we consider a malicious Aggregator which is not only interested in compromising users’ privacy but ...
Iraklis Leontiadis   +3 more
openaire   +4 more sources

Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve

open access: yes, 2008
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core   +2 more sources

A CCA2 Secure Variant of the McEliece Cryptosystem [PDF]

open access: yes, 2012
The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Differently from RSA and ElGa- mal, McEliece PKC is not known to be broken by a quantum computer.
Dowsley, Rafael   +3 more
core   +5 more sources

Blockchain and Quantum Technologies for Securing the Global Nuclear Supply Chain: Synergies, Applications, Technical Challenges and Opportunities

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley   +1 more source

Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]

open access: yes, 2006
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core   +1 more source

Secure Authentication via Quantum Physical Unclonable Functions: A Review

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré   +8 more
wiley   +1 more source

Lottery and Auction on Quantum Blockchain

open access: yesEntropy, 2020
This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security.
Xin Sun, Piotr Kulicki, Mirek Sopek
doaj   +1 more source

An Efficient Existentially Unforgeable Signature Scheme and its Applications [PDF]

open access: yesJournal of Cryptology, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dwork, Cynthia, Naor, Moni
openaire   +2 more sources

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Rapid Nasal Breathing as a Biometric Trigger: High‐Accuracy Electroencephalogram‐Based Authentication for Clinical Applications

open access: yesThe Clinical Respiratory Journal, Volume 20, Issue 1, January 2026.
Our study demonstrates rapid nasal breathing‐evoked EEG signals enable high‐accuracy (98.3%) biometric authentication via a hybrid ResNet‐Swin Transformer model. This noninvasive approach eliminates external stimuli, offering secure patient identification for critical respiratory care settings, such as ventilator access and continuous monitoring ...
Cai Chen   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy