Results 61 to 70 of about 5,816 (214)
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S +2 more
core +2 more sources
Sound and Fine-grain Specification of Ideal Functionalities [PDF]
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compared with an ideal process where the outputs are computed by a trusted party that sees ...
Garay, Juan +2 more
core +1 more source
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer +5 more
wiley +1 more source
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication.
Sunil Prajapat +5 more
doaj +1 more source
CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks
The CommTLC scheme is secure against Fakey, Griefing and Wormhole attacks, as proven using the universal composability framework. It detects adversaries in these attacks within 112 ms for a payment path involving five users. Additionally, it outperforms recent privacy‐preserving PCN‐based solutions, MAPPCN‐OR and EAMHL+, in terms of communication and ...
Prerna Arote, Joy Kuri
wiley +1 more source
Generic Construction of Dual‐Server Public Key Authenticated Encryption With Keyword Search
In this paper, we propose a generic construction of dual‐server public key authenticated encryption with keyword search (DS‐PAEKS) from PAEKS, public key encryption, and signatures. We also show that previous DS‐PAEKS scheme is vulnerable by providing a concrete attack. That is, the proposed generic construction yields the first DS‐PAEKS schemes.
Keita Emura, Puttamadappa C.
wiley +1 more source
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the ...
Changgen PENG +3 more
doaj +2 more sources
Partially blind proxy re-signature scheme with proven security
In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially ...
Xiaodong YANG +5 more
doaj
Design of Linkable Ring Signature Scheme Based on the MP‐LWE Problem and Its Application in IoV
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle‐product learning with errors (MP‐LWE) problem and applies it to vehicular ...
Lansheng Han +3 more
wiley +1 more source
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential ...
ZHANG Ming-wu1 +3 more
doaj +2 more sources

