Results 71 to 80 of about 5,707 (192)
Analysis and improvement of an identity-based signature scheme from lattices
Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove
ANGChun-li Y +4 more
doaj +2 more sources
Constructing Efficient Identity‐Based Signatures on Lattices
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia +4 more
wiley +1 more source
Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj +1 more source
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S +2 more
core +2 more sources
A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang +5 more
wiley +1 more source
Leveraging dual‐blockchain collaboration for logistics supply chain supervision
Logistics supply chains record transactions but face issues with privacy and supervision on the blockchain, a dual‐blockchain scheme is proposed with a supervision chain and management approach to enable efficient cross‐chain collaboration while preventing data leakage.
Licheng Lin +3 more
wiley +1 more source
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source
zk‐STARKs based scheme for sealed auctions in chains
This paper proposes a novel on‐chain sealed auction scheme based on zk‐STARKs, leveraging blockchain's decentralization and immutability to enhance auction security and efficiency. Experimental results demonstrate significant reductions in verification time, making the scheme highly suitable for large‐scale auction scenarios.
Li Wei, Liang Peili, Li Fei
wiley +1 more source
Certificateless strong designated verifier multi-signature
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal +2 more
core

