Hybrid homomorphic encryption scheme for secure cloud data storage

B Seth, S Dalal, R Kumar - Recent Advances in Computational Intelligence, 2019 - Springer
Cloud computing is the budding paradigm nowadays in the macrocosm of the information
processing system. It offers a variety of services for the users through the Internet and is …

Identity-based proxy signature with message recovery over NTRU lattice

F Wu, B Zhou, X Zhang - Entropy, 2023 - mdpi.com
Proxy signature is one of the important primitives of public-key cryptography and plays an
essential role in delivering security services in modern communications. However, existing …

A SM2 elliptic curve threshold signature scheme without a trusted center

Y Jie, L Yu, C Li-yun, N Wei - KSII Transactions on Internet and …, 2016 - koreascience.kr
Threshold signature is very important in identity authentication and some other applications.
In December 2010, Chinese Encryption Administration released the SM2 elliptic curve …

Analysis and design of an optimized secure auditing protocol for storing data dynamically in cloud computing

R Kumar, G Singh - Materials Today: Proceedings, 2018 - Elsevier
Abstract The remote server (Cloud Service Provider (CSP)) store their data on cloud servers
and users can access their data from cloud servers while implementing the concept of cloud …

Cryptanalytic performance appraisal of improved HLL, KUOCHEN, GENGVRF, FENGVRF secure signature with TKIP digital workspaces: for financial cryptography

R Kumar - Wireless Personal Communications, 2020 - Springer
Abstract Financial Cryptography and Security Engineering are the significant areas for
research, advanced development, education, exploration and also for commercial purposes …

Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers

R Kumar - … and Its Applications: Knowledge Manipulation and …, 2018 - Springer
The proxy signature is the elucidation to the entrustment of signing capabilities in any secure
electronic milieu. Numerous schemes are prophesied, but they are chattels of information …

An efficient lattice-based proxy signature with message recovery

F Wu, W Yao, X Zhang, Z Zheng - … December 12-15, 2017, Proceedings 10, 2017 - Springer
Proxy signature scheme is an important cryptographic primitive in which an entity can
delegate its signing rights to another entity, the purpose of proxy signature with message …

A Fully Adaptively Secure Threshold Signature Scheme Based on Dual‐Form Signatures Technology

Y Gan - Security and Communication Networks, 2021 - Wiley Online Library
In (t, n) threshold signature schemes, any subset of t participants out of n can produce a valid
signature, but any fewer than t participants cannot. Meanwhile, a threshold signature …

A Variant of Secret Sharing Protected with Poly-1305

S Arora, S Dalal, R Kumar - Recent Advances in Computational …, 2019 - Springer
We are working in the era of cloud computing, where all of the required resources are
available online at pay-par-basis. It made all the IT industry easily accessible to all types of …

A novel data sharing mechanism via cloud-based dynamic audit for social internet of vehicles

Z Ruan, W Liang, H Luo, H Yan - Internet of Vehicles-Safe and Intelligent …, 2015 - Springer
In this paper, we leverage on the cloud-based data sharing paradigm for vehicles exchange
information in Internet of Vehicles (IOV). Vehicles can join different interest groups to form a …