A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
[chapter]
2005
Lecture Notes in Computer Science
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability (p1m-uf). ...
In the process, we also introduce a new security model for (non-blind) identity-based signcryption (IBSC) which is a strengthening of Boyen's. ...
We present the first blind identity-based signcryption (BIBSC). ...
doi:10.1007/978-3-540-30574-3_21
fatcat:e2h4f5jj7fatfiqefqfsqvepse
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents
2017
Security and Communication Networks
Our scheme incorporates the design of signcryption paradigm into the blind signature scheme to strengthen high levels of security. ...
Thus, we propose a new blind signature scheme for multiple digital documents based on elliptic curve cryptography (ECC). ...
Security goals
Algorithm
A new efficient blind signcryption
(Yu and He, 2008) [36]
Table
Table 3 : 3 Comparison between the proposed scheme and the two existing blind signcryption schemes based ...
doi:10.1155/2017/8981606
fatcat:f2fztffbxffedgfg7gn2qhqfdi
A Review of Cryptographic Electronic Voting
2022
Symmetry
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting, and hybrid e-voting have been ...
proposed in the literature for better security and practical implementation. ...
Elliptic Curve, Bilinear Pairing, Blind Signature, Identity-Based Signature, Short Signature Combine a blind signature scheme with identity-based cryptosystem and short signature scheme Not suitable for ...
doi:10.3390/sym14050858
fatcat:6dzkgrpxgfaanfaxwu3t7teco4
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
2012
IEEE Communications Surveys and Tutorials
It also discusses future directions and open problems of general Identity-Based Cryptography and its application in mobile ad hoc networks. ...
The survey introduces briefly the technology of Identity-Based Cryptography, summarizes different approaches of applying it to secure mobile ad hoc networks. ...
Since 2001, Identity-Based Cryptography (IBC) has been getting more and more attention from researchers on security, including security of MANETs. ...
doi:10.1109/surv.2011.020211.00045
fatcat:bcgqnhfzxrdvlfoq6tmucsjdea
A pairing SW implementation for Smart-Cards
2008
Journal of Systems and Software
The aim of this work is to show the feasibility of the primitives of the identity based cryptosystems for applications in Smart-Cards. ...
We modify the Chudnovsky elliptic curve point representation to settle a dedicated coordinate system for pairings and to minimize the number of operations in the finite field. ...
, such as signcryption, identity-based signcryption, authentication and identification. ...
doi:10.1016/j.jss.2007.09.022
fatcat:wv22mlqetfb43jas7cvynwuf7i
Privacy-Preserving Solutions in Blockchain-Enabled Internet of Vehicles
2021
Applied Sciences
In this context, it analyses existing solutions' main characteristics and properties to provide a comprehensive and critical overview and identifies their contribution in the field. ...
Blockchain technology can inherently guarantee the availability, integrity and immutability of data stored in IoV, yet it cannot protect privacy and data confidentiality on its own. ...
the transactions fast and secure. ...
doi:10.3390/app11219792
fatcat:3yh7w3xqdzedrdwsiyndhq7j4e
The Realm of the Pairings
[chapter]
2014
Lecture Notes in Computer Science
In this paper we review the evolution of pairing-based cryptosystems, the development of efficient algorithms and the state of the art in pairing computation, and the challenges yet to be addressed on ...
Bilinear maps, or pairings, initially proposed in a cryptologic context for cryptanalytic purposes, proved afterward to be an amazingly flexible and useful tool for the construction of cryptosystems with ...
Foremost among pairing-based schemes are the identity-based cryptosystems. ...
doi:10.1007/978-3-662-43414-7_1
fatcat:iwbcam5dijalhpdw3no7j6riam
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. ...
The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. ...
is not proven using the formal security analysis
techniques. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh Networks
2013
IOSR Journal of Computer Engineering
This approach organizes the nodes and discovers multiple paths using breadth first search algorithm. From multiple paths, the primary path is elected using Expected Forwarding Counter (EFW) metric. ...
We evaluate quality linked based in our approach using network simulator 2 (NS-2). Our approach discovers multiple paths effectively and the elected primary path is more reliable. ...
Acknowledgement The author(s) would like to thank faculty members and other contributor for their very useful advises. ...
doi:10.9790/0661-1360107
fatcat:gd2ulyqagveodduiy7kgh6xena
Critical perspectives on provable security: Fifteen years of "another look" papers
2019
Advances in Mathematics of Communications
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half. ...
We also provide numerous additional examples and a few updates and errata. 2010 Mathematics Subject Classification: Primary: 94A60. ...
for editorial corrections and comments. ...
doi:10.3934/amc.2019034
fatcat:gpftyd4hxjebfpzdqwdes345na
Group key agreement from bilinear pairings
2013
We propose a new framework for constructing secure and efficient computationally asymmetric authenticated GKA protocols from identity-based signcryption schemes and adapt this framework to construct a ...
We formally prove the security of our protocols in the random oracle model and show that they are communication and computationally efficient in comparison to the pairing-based protocols from the literature ...
In Chapter 5, we'll see how cryptographers applied the bilinear pairing to the DH-based group key agreement models presented in this chapter to produce fast, efficient and secure pairing-based group key ...
doi:10.20381/ruor-19183
fatcat:q4f74tf3rbdztks3livh7gb6jy
Bi-Fitness Swarm Optimizer: Blockchain Assisted Secure Swarm Intelligence Routing Protocol for MANET
2021
Indian Journal of Computer Science and Engineering
Secure Priority based Routing is presented by Particle Swarm Optimization (PSO) method. In this step, bi-fitness optimizer is used. ...
Mobile Ad Hoc Networks is a communication network between devices without infrastructure and random mobility of device and hence proper management of nodes and security provisioning is a vital task and ...
A signcryption based secured routing protocol is applied for reliable and secure data transmission. ...
doi:10.21817/indjcse/2021/v12i5/211205158
fatcat:sao647dpyfhkzkqkjjd7orlmbq
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions
[article]
2022
arXiv
pre-print
IoVs, however, suffer from issues of security, privacy and trust. ...
The key challenges resulted from the integration of Blockchain with IoV is investigated in several domains such as edge computing, ML, and FL. ...
a vehicle from its blind spot. ...
arXiv:2203.10708v1
fatcat:sozptzz5l5a27oh5rukujcg32a
MRD Hashing
[chapter]
1998
Lecture Notes in Computer Science
Conference proceedings from which only one or two papers have been abstracted are cited inline in the review. ...
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication. ...
The key is computed from client-chosen secrets and client and server identities using a cryptographic hash function. ...
doi:10.1007/3-540-69710-1_10
fatcat:mezaspbmk5c4nhu227gayoeejq
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance
2021
Computer Networks
means for creating truly trustless and secure solutions for IoT applications. ...
Taking into account the weak security defences that the majority of IoT devices have, it is critical that a blockchain-based solution targeting the IoT is not only capable of addressing the many challenges ...
Countermeasures
Identity
Replay attacks
Elliptic curve encryption
Key attacks
Elliptic curve encryption
PKC key pairs' freshness
Impersonation
attacks
Elliptic curve encryption
Signcryption ...
doi:10.1016/j.comnet.2021.108005
fatcat:35tosxqpxjawzilnxoco5u2b5q
« Previous
Showing results 1 — 15 out of 22 results