Results 71 to 80 of about 5,707 (192)

Analysis and improvement of an identity-based signature scheme from lattices

open access: yesTongxin xuebao, 2015
Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove
ANGChun-li Y   +4 more
doaj   +2 more sources

Constructing Efficient Identity‐Based Signatures on Lattices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia   +4 more
wiley   +1 more source

Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession

open access: yesIEEE Access, 2019
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj   +1 more source

An Elliptic Curve-based Signcryption Scheme with Forward Secrecy

open access: yes, 2012
An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the ...
Ali Asghar Beheshti S   +2 more
core   +2 more sources

A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang   +5 more
wiley   +1 more source

Leveraging dual‐blockchain collaboration for logistics supply chain supervision

open access: yesIET Blockchain, Volume 4, Issue S1, Page 570-585, December 2024.
Logistics supply chains record transactions but face issues with privacy and supervision on the blockchain, a dual‐blockchain scheme is proposed with a supervision chain and management approach to enable efficient cross‐chain collaboration while preventing data leakage.
Licheng Lin   +3 more
wiley   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

zk‐STARKs based scheme for sealed auctions in chains

open access: yesIET Blockchain, Volume 4, Issue 4, Page 344-354, December 2024.
This paper proposes a novel on‐chain sealed auction scheme based on zk‐STARKs, leveraging blockchain's decentralization and immutability to enhance auction security and efficiency. Experimental results demonstrate significant reductions in verification time, making the scheme highly suitable for large‐scale auction scenarios.
Li Wei, Liang Peili, Li Fei
wiley   +1 more source

Certificateless strong designated verifier multi-signature

open access: yesTongxin xuebao, 2016
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj  

Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]

open access: yes, 2007
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal   +2 more
core  

Home - About - Disclaimer - Privacy