Results 61 to 70 of about 5,816 (214)

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

open access: yes, 2012
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S   +2 more
core   +2 more sources

Sound and Fine-grain Specification of Ideal Functionalities [PDF]

open access: yes, 2009
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compared with an ideal process where the outputs are computed by a trusted party that sees ...
Garay, Juan   +2 more
core   +1 more source

Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 1, January/February 2025.
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer   +5 more
wiley   +1 more source

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security

open access: yesIEEE Access
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication.
Sunil Prajapat   +5 more
doaj   +1 more source

CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
The CommTLC scheme is secure against Fakey, Griefing and Wormhole attacks, as proven using the universal composability framework. It detects adversaries in these attacks within 112 ms for a payment path involving five users. Additionally, it outperforms recent privacy‐preserving PCN‐based solutions, MAPPCN‐OR and EAMHL+, in terms of communication and ...
Prerna Arote, Joy Kuri
wiley   +1 more source

Generic Construction of Dual‐Server Public Key Authenticated Encryption With Keyword Search

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this paper, we propose a generic construction of dual‐server public key authenticated encryption with keyword search (DS‐PAEKS) from PAEKS, public key encryption, and signatures. We also show that previous DS‐PAEKS scheme is vulnerable by providing a concrete attack. That is, the proposed generic construction yields the first DS‐PAEKS schemes.
Keita Emura, Puttamadappa C.
wiley   +1 more source

Efficient signcryption scheme based on Cocks’ identity cryptosystem

open access: yesTongxin xuebao, 2020
Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the ...
Changgen PENG   +3 more
doaj   +2 more sources

Partially blind proxy re-signature scheme with proven security

open access: yesTongxin xuebao, 2018
In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially ...
Xiaodong YANG   +5 more
doaj  

Design of Linkable Ring Signature Scheme Based on the MP‐LWE Problem and Its Application in IoV

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle‐product learning with errors (MP‐LWE) problem and applies it to vehicular ...
Lansheng Han   +3 more
wiley   +1 more source

Cryptanalysis and design of signature schemes with identity ambiguity in the standard model

open access: yesTongxin xuebao, 2011
The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential ...
ZHANG Ming-wu1   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy