Filters








22 Hits in 6.6 sec

Fast and Proven Secure Blind Identity-Based Signcryption from Pairings [chapter]

Tsz Hon Yuen, Victor K. Wei
2005 Lecture Notes in Computer Science  
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability (p1m-uf).  ...  In the process, we also introduce a new security model for (non-blind) identity-based signcryption (IBSC) which is a strengthening of Boyen's.  ...  We present the first blind identity-based signcryption (BIBSC).  ... 
doi:10.1007/978-3-540-30574-3_21 fatcat:e2h4f5jj7fatfiqefqfsqvepse

An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents

Chien-Hua Tsai, Pin-Chang Su
2017 Security and Communication Networks  
Our scheme incorporates the design of signcryption paradigm into the blind signature scheme to strengthen high levels of security.  ...  Thus, we propose a new blind signature scheme for multiple digital documents based on elliptic curve cryptography (ECC).  ...  Security goals Algorithm A new efficient blind signcryption (Yu and He, 2008) [36] Table Table 3 : 3 Comparison between the proposed scheme and the two existing blind signcryption schemes based  ... 
doi:10.1155/2017/8981606 fatcat:f2fztffbxffedgfg7gn2qhqfdi

A Review of Cryptographic Electronic Voting

Yun-Xing Kho, Swee-Huay Heng, Ji-Jian Chin
2022 Symmetry  
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting, and hybrid e-voting have been  ...  proposed in the literature for better security and practical implementation.  ...  Elliptic Curve, Bilinear Pairing, Blind Signature, Identity-Based Signature, Short Signature Combine a blind signature scheme with identity-based cryptosystem and short signature scheme Not suitable for  ... 
doi:10.3390/sym14050858 fatcat:6dzkgrpxgfaanfaxwu3t7teco4

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks

Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai
2012 IEEE Communications Surveys and Tutorials  
It also discusses future directions and open problems of general Identity-Based Cryptography and its application in mobile ad hoc networks.  ...  The survey introduces briefly the technology of Identity-Based Cryptography, summarizes different approaches of applying it to secure mobile ad hoc networks.  ...  Since 2001, Identity-Based Cryptography (IBC) has been getting more and more attention from researchers on security, including security of MANETs.  ... 
doi:10.1109/surv.2011.020211.00045 fatcat:bcgqnhfzxrdvlfoq6tmucsjdea

A pairing SW implementation for Smart-Cards

Guido M. Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi
2008 Journal of Systems and Software  
The aim of this work is to show the feasibility of the primitives of the identity based cryptosystems for applications in Smart-Cards.  ...  We modify the Chudnovsky elliptic curve point representation to settle a dedicated coordinate system for pairings and to minimize the number of operations in the finite field.  ...  , such as signcryption, identity-based signcryption, authentication and identification.  ... 
doi:10.1016/j.jss.2007.09.022 fatcat:wv22mlqetfb43jas7cvynwuf7i

Privacy-Preserving Solutions in Blockchain-Enabled Internet of Vehicles

Konstantinos Kaltakis, Panagiota Polyzi, George Drosatos, Konstantinos Rantos
2021 Applied Sciences  
In this context, it analyses existing solutions' main characteristics and properties to provide a comprehensive and critical overview and identifies their contribution in the field.  ...  Blockchain technology can inherently guarantee the availability, integrity and immutability of data stored in IoV, yet it cannot protect privacy and data confidentiality on its own.  ...  the transactions fast and secure.  ... 
doi:10.3390/app11219792 fatcat:3yh7w3xqdzedrdwsiyndhq7j4e

The Realm of the Pairings [chapter]

Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
2014 Lecture Notes in Computer Science  
In this paper we review the evolution of pairing-based cryptosystems, the development of efficient algorithms and the state of the art in pairing computation, and the challenges yet to be addressed on  ...  Bilinear maps, or pairings, initially proposed in a cryptologic context for cryptanalytic purposes, proved afterward to be an amazingly flexible and useful tool for the construction of cryptosystems with  ...  Foremost among pairing-based schemes are the identity-based cryptosystems.  ... 
doi:10.1007/978-3-662-43414-7_1 fatcat:iwbcam5dijalhpdw3no7j6riam

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security.  ...  The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables.  ...  is not proven using the formal security analysis techniques.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh Networks

Rekha Patil
2013 IOSR Journal of Computer Engineering  
This approach organizes the nodes and discovers multiple paths using breadth first search algorithm. From multiple paths, the primary path is elected using Expected Forwarding Counter (EFW) metric.  ...  We evaluate quality linked based in our approach using network simulator 2 (NS-2). Our approach discovers multiple paths effectively and the elected primary path is more reliable.  ...  Acknowledgement The author(s) would like to thank faculty members and other contributor for their very useful advises.  ... 
doi:10.9790/0661-1360107 fatcat:gd2ulyqagveodduiy7kgh6xena

Critical perspectives on provable security: Fifteen years of "another look" papers

Neal Koblitz, Alfred Menezes
2019 Advances in Mathematics of Communications  
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half.  ...  We also provide numerous additional examples and a few updates and errata. 2010 Mathematics Subject Classification: Primary: 94A60.  ...  for editorial corrections and comments.  ... 
doi:10.3934/amc.2019034 fatcat:gpftyd4hxjebfpzdqwdes345na

Group key agreement from bilinear pairings

Nicholas J Mailloux, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
2013
We propose a new framework for constructing secure and efficient computationally asymmetric authenticated GKA protocols from identity-based signcryption schemes and adapt this framework to construct a  ...  We formally prove the security of our protocols in the random oracle model and show that they are communication and computationally efficient in comparison to the pairing-based protocols from the literature  ...  In Chapter 5, we'll see how cryptographers applied the bilinear pairing to the DH-based group key agreement models presented in this chapter to produce fast, efficient and secure pairing-based group key  ... 
doi:10.20381/ruor-19183 fatcat:q4f74tf3rbdztks3livh7gb6jy

Bi-Fitness Swarm Optimizer: Blockchain Assisted Secure Swarm Intelligence Routing Protocol for MANET

Haridas .S, Dr.A. Rama Prasath
2021 Indian Journal of Computer Science and Engineering  
Secure Priority based Routing is presented by Particle Swarm Optimization (PSO) method. In this step, bi-fitness optimizer is used.  ...  Mobile Ad Hoc Networks is a communication network between devices without infrastructure and random mobility of device and hence proper management of nodes and security provisioning is a vital task and  ...  A signcryption based secured routing protocol is applied for reliable and secure data transmission.  ... 
doi:10.21817/indjcse/2021/v12i5/211205158 fatcat:sao647dpyfhkzkqkjjd7orlmbq

A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions [article]

Brian Hildebrand, Mohamed Baza, Tara Salman, Fathi Amsaad, Abdul Razaqu, Abdullah Alourani
2022 arXiv   pre-print
IoVs, however, suffer from issues of security, privacy and trust.  ...  The key challenges resulted from the integration of Blockchain with IoV is investigated in several domains such as edge computing, ML, and FL.  ...  a vehicle from its blind spot.  ... 
arXiv:2203.10708v1 fatcat:sozptzz5l5a27oh5rukujcg32a

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
Conference proceedings from which only one or two papers have been abstracted are cited inline in the review.  ...  The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication.  ...  The key is computed from client-chosen secrets and client and server identities using a cryptographic hash function.  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance

Sotirios Brotsis, Konstantinos Limniotis, Gueltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles
2021 Computer Networks  
means for creating truly trustless and secure solutions for IoT applications.  ...  Taking into account the weak security defences that the majority of IoT devices have, it is critical that a blockchain-based solution targeting the IoT is not only capable of addressing the many challenges  ...  Countermeasures Identity Replay attacks Elliptic curve encryption Key attacks Elliptic curve encryption PKC key pairs' freshness Impersonation attacks Elliptic curve encryption Signcryption  ... 
doi:10.1016/j.comnet.2021.108005 fatcat:35tosxqpxjawzilnxoco5u2b5q
« Previous Showing results 1 — 15 out of 22 results