Results 51 to 60 of about 5,816 (214)
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
Fiat-Shamir for highly sound protocols is instantiable [PDF]
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto '86) is a popular paradigm for constructing very efficient non-interactive zero-knowledge (NIZK) arguments and signature schemes from a hash function and any three-move interactive protocol ...
Mittelbach, Arno, Venturi, Daniele
core +1 more source
Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen +4 more
wiley +1 more source
Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption
Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication.
Abdul Waheed +5 more
doaj +1 more source
On the Quantum Security of OCB
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 has been shown to be classically insecure (Inoue et al., Crypto 2019).
Varun Maram +3 more
doaj +1 more source
On the "Security analysis and improvements of arbitrated quantum signature schemes"
Recently, Zou et al. [Phys. Rev. A 82, 042325 (2010)] pointed out that two arbitrated quantum signature (AQS) schemes are not secure, because an arbitrator cannot arbitrate the dispute between two users when a receiver repudiates the integrity of a ...
H. Barnum +5 more
core +1 more source
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav +3 more
wiley +1 more source
Shorter Double-Authentication Preventing Signatures for Small Address Spaces [PDF]
A recent paper by Derler, Ramacher, and Slamanig (IEEE EuroS&P 2018) constructs double-authentication preventing signatures ( DAP signatures , a specific self-enforcement enabled variant of signatures where messages consist of an address and a payload ...
A Fiat +13 more
core +2 more sources
MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications
This paper presents the Metaverse Off‐chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized systems that supports code or stored data updates without changing on‐chain data. It significantly reduces overhead compared to directly storing data within a smart contract. ABSTRACT Blockchain has evolved into a secure and
Chenxi Xiong, Ting Yang, Gang Mao
wiley +1 more source
On the security of joint signature and encryption revisited
In 2002, An et al. [1] proposed three generic conversions of signcryption, ℰt𝒮${\mathcal{E}t\mathcal{S}}$, 𝒮tℰ${\mathcal{S}t\mathcal{E}}$ and 𝒞tℰ&𝒮${\mathcal{C}t\mathcal{E}\&\mathcal{S}}$ from the primitive encryption scheme and signature scheme ...
Nandi Mridul, Pandit Tapas
doaj +1 more source

