1,318 Hits in 7.6 sec

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
Finally, we discuss the main challenges with respect to current PETs and highlight some future directions for developing their post-quantum counterparts.  ...  Particularly, we emphasize on post-quantum cryptography techniques that may (or must when quantum computers become a reality) be used in the future through concrete products, pilots, and projects.  ...  The 6.8 kB public key for 50 users can be reduced by 68% to 2.1 kB, and the signature size is ca 31 kB. 3) QUANTUM-RESISTANT BLIND SIGNATURES In 2010, the first quantum-resistant blind signature scheme  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

A trusted cryptocurrency scheme for secure and verifiable digital transactions

Marco Baldi, Franco Chiaraluce
2017 First Monday  
Then, a secure supervision and authentication network is designed, which allows to control transactions, while guaranteeing users' privacy.  ...  Based on a thorough security analysis, a new cryptocurrency model is first defined, exploiting a set of secure and post-quantum cryptographic primitives.  ...  In blind authentication, a user’s public key is created, by embedding some of the user’s physical features in the key generation procedure.  ... 
doi:10.5210/fm.v22i11.6981 fatcat:cqk2yy32pzhc3dzf57gyyw7udq

A Review of Cryptographic Electronic Voting

Yun-Xing Kho, Swee-Huay Heng, Ji-Jian Chin
2022 Symmetry  
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting, and hybrid e-voting have been  ...  proposed in the literature for better security and practical implementation.  ...  According to Fernández-Caramés and Fraga-Lamas [165] , the challenges of post-quantum blockchain include the key size required for post-quantum cryptosystems which is larger than that required for public-key  ... 
doi:10.3390/sym14050858 fatcat:6dzkgrpxgfaanfaxwu3t7teco4

Security of Electronic Payment Systems: A Comprehensive Survey [article]

Siamak Solat
2017 arXiv   pre-print
cash and E-payment systems, use of quantum key distribution (QKD) in electronic payment systems to achieve unconditional security rather than only computational assurance of the security level by using  ...  The evaluation of the Card-not-present transactions approaches including 3D Secure, 3D SET, SET/EMV and EMV/CAP, the impact of concept of Tokenization and the role of Blind Signatures schemes in electronic  ...  The authors in [124] introduce the concept of Decentralized Anonymous Payment (abbreviated DAP) by which a user is able to pay privately another one, in which the transaction does not reveal the sender  ... 
arXiv:1701.04556v1 fatcat:cf7tocn2znda5btqk5ajdqex5m

A Novel Post-Quantum Blind Signature for Log System in Blockchain

Gang Xu, Yibo Cao, Shiyuan Xu, Ke Xiao, Xin Liu, Xiubo Chen, Mianxiong Dong
2022 Computer systems science and engineering  
Thus, blind signature on the lattice in post-quantum blockchain brings new security features for log systems.  ...  In our paper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks.  ...  As the block containing log information passes all authentication, it is formally added to the post-quantum blockchain automatically.  ... 
doi:10.32604/csse.2022.022100 fatcat:gbwt4snlknbptn7kzryjnazib4

A Quantum Blind Multi-Signature Method for the Industrial Blockchain

Zhengying Cai, Shi Liu, Zhangyi Han, Rui Wang
2021 Entropy  
Here, a quantum blind multi-signature method is proposed for the multi-party transaction to provide anti-quantum security.  ...  First, the proposed multi-party transaction frame and quantum key distribution in the industrial blockchain are introduced.  ...  Acknowledgments: The authors would like to thank all the anonymous reviewers for their hard work to improve the quality of this submission.  ... 
doi:10.3390/e23111520 pmid:34828218 pmcid:PMC8622831 fatcat:sqph2kmu6jaqbmnch3mjxhf4bm

Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective [article]

Andrada-Teodora Ciulei, Marian-Codrin Cretu, Emil Simion
2022 IACR Cryptology ePrint Archive  
At the same time, the increased progress of quantum computers and quantum-based algorithms threatens the security of the classical cryptographic algorithms, in consequence, it represents a risk for the  ...  We provide an analysis of the most important cryptocurrencies according to their ranking by market capitalization (MC) in the context of quantum threats, and we end up with a review of post-quantum blockchain  ...  signature scheme called ID-Rainbow (proposed by Chen in [69] ). • A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network [135] : In the context of post-quantum blockchain, Li  ... 
dblp:journals/iacr/CiuleiCS22 fatcat:dw3z6d6nnfc7lll55dwejilg5a

Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting

Peng Li, Junzuo Lai, Yongdong Wu, Savio Sciancalepore
2021 Security and Communication Networks  
Numerous anonymous authentication schemes are designed to provide efficient authentication services while preserving privacy.  ...  satisfies the access policy can the user be involved in authentication; and (iv) public traceability, i.e., anyone, without help from the trusted third party, can trace a misbehaving user who has authenticated  ...  Full anonymity for TABAA schemes is defined in the following game between the challenger C and the adversary A: (1) A creates a master key pair (mpk, msk). e master public key mpk is given to the C, while  ... 
doi:10.1155/2021/6611518 fatcat:ksm3x2yin5emldbhwaenjxrdmm

Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world

Ahto Buldas, Risto Laanoja, Ahto Truu
2017 International Journal of Services Technology and Management  
This paper is a revised and expanded version of a paper entitled 'Keyless signature infrastructure and PKI: hash-tree signatures in pre-and post-quantum world' presented at the  ...  Reference to this paper should be made as follows: Buldas, A., Laanoja, R. and Truu, A. (2017) 'Keyless signature infrastructure and PKI: hash-tree signatures in pre-and post-quantum world', Int. .  ...  Post-quantum security of hash functions Quantum computing was visioned in early 1980s by Manin (1980) and Feynman (1982) .  ... 
doi:10.1504/ijstm.2017.081881 fatcat:a27mw6daonedtl5t6rwlirgnya

Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme

M. Seshadri Srinath, Venkatachalam Chandrasekaran
2018 International Journal of Network Security  
In this paper, we propose an Undeniable Blind Signature scheme (UBSS) based on isogenies between supersingular elliptic curves.  ...  Finally, we prove that the proposed scheme is secure in the presence of a quantum adversary under certain assumptions.  ...  He also thanks David Jao for suggestions (i) to formalize the definition of UBSS (ii) to give a careful thought to its applications (iii) to state the isogeny problems in a general form and (iv) to improve  ... 
dblp:journals/ijnsec/SrinathC18 fatcat:ic4oawiplrggfpfpjvoib4pzt4

Post-quantum cryptography-driven security framework for cloud computing

Henry Chima Ukwuoma, Gabriel Arome, Aderonke Thompson, Boniface Kayode Alese
2022 Open Computer Science  
With encryption being the dominant method of cloud data security, the advent of quantum computing implies an urgent need to proffer a model that will provide adequate data security for both classical and  ...  The article proposes a model that comprises the application of a variant of McEliece cryptosystem, which has been tipped to replace Rivest–Shamir–Adleman (RSA) in the quantum computing era to secure access  ...  very slow processing speed and does not support encryption at the data storage and network levels [29] Proposed using four prime numbers in the key generation of RSA RSA is not quantum safe Post-quantum  ... 
doi:10.1515/comp-2022-0235 fatcat:hexuew645be2laxfpknbfgrwfm

The Purview of Blockchain Appositeness in Computing Paradigms: A Survey

Battula V. Satish Babu, Kare Suresh Babu
2021 Ingénierie des Systèmes d'Information  
Blockchain is notable for its prominent features like immutability, decentralization, consensus, privacy, and security.  ...  To conduct this study, we have surveyed different research articles in the combination of blockchain technology and computing paradigms.  ...  Finally, they expounded on the need for post-quantum cryptographic mechanisms.  ... 
doi:10.18280/isi.260104 fatcat:nmrcswvhore55flmzsfcmsyeua

Benchmarking of Quantum Protocols [article]

Chin-Te Liao, Sima Bahrani, Francisco Ferreira da Silva, Elham Kashefi
2022 arXiv   pre-print
In this paper, we consider several quantum protocols that enable promising functionalities and services in near-future quantum networks.  ...  The protocols are chosen from both areas of quantum communication and quantum computation as follows: quantum money, W-state based anonymous transmission, verifiable blind quantum computation, and quantum  ...  In summary, in this paper we presented detailed performance analysis of several quantum protocols: quantum money, W-state based anonymous transmission, verifiable blind quantum computation, and quantum  ... 
arXiv:2111.02527v2 fatcat:hndurf46lzchbgu73r5pbswegu

IEEE Access Special Section Editorial: Information Security Solutions for Telemedicine Applications

Amit Kumar Singh, Zhihan Lv, Seungmin Rho, Sanjay Kumar Singh, Xiaojun Chang, William Puech
2018 IEEE Access  
key agreement in telemedicine application,'' Qikun Zhang et al. proposed a dynamic and cross-domain authenticated asymmetric group key agreement for telemedicine.  ...  protocol for sink node location in telemedicine networks,'' authored by Ting Li et al., presented a privacy-preserving protocol for sink node location for telemedicine networks.  ... 
doi:10.1109/access.2018.2885256 fatcat:eiyugo3d5fbztnzqnum3chbdeu

An Anti-Quantum E-Voting Protocol in Blockchain with Audit Function

Shiyao Gao, Dong Zheng, Rui Guo, Chunming Jing, Chencheng Hu
2019 IEEE Access  
After performance analysis, our scheme is suitable for the small-scale election and has some advantages in security and efficiency when the number of voters is small.  ...  For more information, see VOLUME 7, 2019 INDEX TERMS  ...  RUI GUO received the Ph.D. degree from the State Key Laboratory of Networking and Switch Technology, Beijing University of Posts and Telecommunications, China, in 2014.  ... 
doi:10.1109/access.2019.2935895 fatcat:d4fzqwtx4ncvtb5hom6nqb3aqy
« Previous Showing results 1 — 15 out of 1,318 results