Results 61 to 70 of about 5,707 (192)

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security

open access: yesIEEE Access
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication.
Sunil Prajapat   +5 more
doaj   +1 more source

Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 1, January/February 2025.
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer   +5 more
wiley   +1 more source

CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
The CommTLC scheme is secure against Fakey, Griefing and Wormhole attacks, as proven using the universal composability framework. It detects adversaries in these attacks within 112 ms for a payment path involving five users. Additionally, it outperforms recent privacy‐preserving PCN‐based solutions, MAPPCN‐OR and EAMHL+, in terms of communication and ...
Prerna Arote, Joy Kuri
wiley   +1 more source

Efficient signcryption scheme based on Cocks’ identity cryptosystem

open access: yesTongxin xuebao, 2020
Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the ...
Changgen PENG   +3 more
doaj   +2 more sources

Partially blind proxy re-signature scheme with proven security

open access: yesTongxin xuebao, 2018
In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially ...
Xiaodong YANG   +5 more
doaj  

Generic Construction of Dual‐Server Public Key Authenticated Encryption With Keyword Search

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this paper, we propose a generic construction of dual‐server public key authenticated encryption with keyword search (DS‐PAEKS) from PAEKS, public key encryption, and signatures. We also show that previous DS‐PAEKS scheme is vulnerable by providing a concrete attack. That is, the proposed generic construction yields the first DS‐PAEKS schemes.
Keita Emura, Puttamadappa C.
wiley   +1 more source

Cryptanalysis and design of signature schemes with identity ambiguity in the standard model

open access: yesTongxin xuebao, 2011
The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential ...
ZHANG Ming-wu1   +3 more
doaj   +2 more sources

Generic Transformation to Strongly Unforgeable Signatures [PDF]

open access: yes, 2007
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strongly unforgeable ones (the message in the forgery could have been signed previously). Most of the techniques are based on trapdoor hash functions and all of them require adding
Qiong Huang, Duncan S. Wong, Yiming Zhao
openaire   +1 more source

Design of Linkable Ring Signature Scheme Based on the MP‐LWE Problem and Its Application in IoV

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle‐product learning with errors (MP‐LWE) problem and applies it to vehicular ...
Lansheng Han   +3 more
wiley   +1 more source

ID-based server-aided verification signature scheme with strong unforgeability

open access: yesTongxin xuebao, 2016
Most identity-based signature schemes in the standard model are existentially unforgeable,which cannot prevent adversaries from forging valid signatures on messages that have previously been signed.However,signature verification algorithms of ID-based ...
Xiao-dong YANG   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy