Results 51 to 60 of about 5,816 (214)

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Fiat-Shamir for highly sound protocols is instantiable [PDF]

open access: yes, 2016
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto '86) is a popular paradigm for constructing very efficient non-interactive zero-knowledge (NIZK) arguments and signature schemes from a hash function and any three-move interactive protocol ...
Mittelbach, Arno, Venturi, Daniele
core   +1 more source

Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 7, July 2025.
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen   +4 more
wiley   +1 more source

Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption

open access: yesMathematics, 2019
Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication.
Abdul Waheed   +5 more
doaj   +1 more source

On the Quantum Security of OCB

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 has been shown to be classically insecure (Inoue et al., Crypto 2019).
Varun Maram   +3 more
doaj   +1 more source

On the "Security analysis and improvements of arbitrated quantum signature schemes"

open access: yes, 2011
Recently, Zou et al. [Phys. Rev. A 82, 042325 (2010)] pointed out that two arbitrated quantum signature (AQS) schemes are not secure, because an arbitrator cannot arbitrate the dispute between two users when a receiver repudiates the integrity of a ...
H. Barnum   +5 more
core   +1 more source

NTRU Lattice–Based Blockchain Consensus–Assisted Vehicle‐to‐Vehicle Authenticated Message Delivery in Internet of Vehicles

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 8, 25 May 2025.
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav   +3 more
wiley   +1 more source

Shorter Double-Authentication Preventing Signatures for Small Address Spaces [PDF]

open access: yes, 2018
A recent paper by Derler, Ramacher, and Slamanig (IEEE EuroS&P 2018) constructs double-authentication preventing signatures ( DAP signatures , a specific self-enforcement enabled variant of signatures where messages consist of an address and a payload ...
A Fiat   +13 more
core   +2 more sources

MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This paper presents the Metaverse Off‐chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized systems that supports code or stored data updates without changing on‐chain data. It significantly reduces overhead compared to directly storing data within a smart contract. ABSTRACT Blockchain has evolved into a secure and
Chenxi Xiong, Ting Yang, Gang Mao
wiley   +1 more source

On the security of joint signature and encryption revisited

open access: yesJournal of Mathematical Cryptology, 2016
In 2002, An et al. [1] proposed three generic conversions of signcryption, ℰ⁢t⁢𝒮${\mathcal{E}t\mathcal{S}}$, 𝒮⁢t⁢ℰ${\mathcal{S}t\mathcal{E}}$ and 𝒞⁢t⁢ℰ&𝒮${\mathcal{C}t\mathcal{E}\&\mathcal{S}}$ from the primitive encryption scheme and signature scheme ...
Nandi Mridul, Pandit Tapas
doaj   +1 more source

Home - About - Disclaimer - Privacy