Hybrid homomorphic encryption scheme for secure cloud data storage
Cloud computing is the budding paradigm nowadays in the macrocosm of the information
processing system. It offers a variety of services for the users through the Internet and is …
processing system. It offers a variety of services for the users through the Internet and is …
Identity-based proxy signature with message recovery over NTRU lattice
F Wu, B Zhou, X Zhang - Entropy, 2023 - mdpi.com
Proxy signature is one of the important primitives of public-key cryptography and plays an
essential role in delivering security services in modern communications. However, existing …
essential role in delivering security services in modern communications. However, existing …
A SM2 elliptic curve threshold signature scheme without a trusted center
Y Jie, L Yu, C Li-yun, N Wei - KSII Transactions on Internet and …, 2016 - koreascience.kr
Threshold signature is very important in identity authentication and some other applications.
In December 2010, Chinese Encryption Administration released the SM2 elliptic curve …
In December 2010, Chinese Encryption Administration released the SM2 elliptic curve …
Analysis and design of an optimized secure auditing protocol for storing data dynamically in cloud computing
Abstract The remote server (Cloud Service Provider (CSP)) store their data on cloud servers
and users can access their data from cloud servers while implementing the concept of cloud …
and users can access their data from cloud servers while implementing the concept of cloud …
Cryptanalytic performance appraisal of improved HLL, KUOCHEN, GENGVRF, FENGVRF secure signature with TKIP digital workspaces: for financial cryptography
R Kumar - Wireless Personal Communications, 2020 - Springer
Abstract Financial Cryptography and Security Engineering are the significant areas for
research, advanced development, education, exploration and also for commercial purposes …
research, advanced development, education, exploration and also for commercial purposes …
Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers
R Kumar - … and Its Applications: Knowledge Manipulation and …, 2018 - Springer
The proxy signature is the elucidation to the entrustment of signing capabilities in any secure
electronic milieu. Numerous schemes are prophesied, but they are chattels of information …
electronic milieu. Numerous schemes are prophesied, but they are chattels of information …
An efficient lattice-based proxy signature with message recovery
F Wu, W Yao, X Zhang, Z Zheng - … December 12-15, 2017, Proceedings 10, 2017 - Springer
Proxy signature scheme is an important cryptographic primitive in which an entity can
delegate its signing rights to another entity, the purpose of proxy signature with message …
delegate its signing rights to another entity, the purpose of proxy signature with message …
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual‐Form Signatures Technology
Y Gan - Security and Communication Networks, 2021 - Wiley Online Library
In (t, n) threshold signature schemes, any subset of t participants out of n can produce a valid
signature, but any fewer than t participants cannot. Meanwhile, a threshold signature …
signature, but any fewer than t participants cannot. Meanwhile, a threshold signature …
A Variant of Secret Sharing Protected with Poly-1305
We are working in the era of cloud computing, where all of the required resources are
available online at pay-par-basis. It made all the IT industry easily accessible to all types of …
available online at pay-par-basis. It made all the IT industry easily accessible to all types of …
A novel data sharing mechanism via cloud-based dynamic audit for social internet of vehicles
Z Ruan, W Liang, H Luo, H Yan - Internet of Vehicles-Safe and Intelligent …, 2015 - Springer
In this paper, we leverage on the cloud-based data sharing paradigm for vehicles exchange
information in Internet of Vehicles (IOV). Vehicles can join different interest groups to form a …
information in Internet of Vehicles (IOV). Vehicles can join different interest groups to form a …