Skip to Content
You are currently on the new version of our website. Access the old version .

10 Results Found

  • Article
  • Open Access
11 Citations
4,094 Views
15 Pages

A Hash-Based Quantum-Resistant Chameleon Signature Scheme

  • P. Thanalakshmi,
  • R. Anitha,
  • N. Anbazhagan,
  • Woong Cho,
  • Gyanendra Prasad Joshi and
  • Eunmok Yang

16 December 2021

As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash...

  • Article
  • Open Access
11 Citations
3,038 Views
12 Pages

A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme

  • P. Thanalakshmi,
  • R. Anitha,
  • N. Anbazhagan,
  • Chulho Park,
  • Gyanendra Prasad Joshi and
  • Changho Seo

11 May 2022

Digital signatures are unsuitable for specific applications that are sensitive on a personal or commercial level because they are universally verifiable. Jakobsson et al. proposed the Designated Verifier Signature (DVS) system, which only allows the...

  • Article
  • Open Access
6 Citations
3,434 Views
19 Pages

Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning

  • Kaixin Peng,
  • Xiaoying Shen,
  • Le Gao,
  • Baocang Wang and
  • Yichao Lu

27 July 2023

Federated learning is a distributed machine learning framework, which allows users to save data locally for training without sharing data. Users send the trained local model to the server for aggregation. However, untrusted servers may infer users&rs...

  • Article
  • Open Access
14 Citations
5,488 Views
22 Pages

Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the c...

  • Article
  • Open Access
581 Views
20 Pages

Role-Based Efficient Proactive Secret Sharing with User Revocation

  • Yixuan He,
  • Yuta Kodera,
  • Yasuyuki Nogami and
  • Samsul Huda

Proactive secret sharing (PSS), an extension of secret-sharing schemes, safeguards sensitive data in dynamic distributed networks by periodically refreshing shares to counter adversarial attacks. In our previous work, we constructed a non-interactive...

  • Article
  • Open Access
1 Citations
1,589 Views
17 Pages

Toward a Secure and Private Cross-Chain Protocol Based on Encrypted Communication

  • Yuli Wang,
  • Zhuo Chen,
  • Ruihe Ma,
  • Bin Ma,
  • Yongjin Xian and
  • Qi Li

Blockchain technology is becoming more prominent and is being used in many different industries. Data islands have emerged as a result of the difficulty in transferring assets and exchanging information between blockchains because of differences in t...

  • Article
  • Open Access
19 Citations
4,664 Views
26 Pages

A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks

  • Wajahat Ali,
  • Ikram Ud Din,
  • Ahmad Almogren and
  • Byung-Seo Kim

15 March 2022

Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network. A novel privacy-preserving method for smart grid-based home area networks (HAN) is proposed...

  • Article
  • Open Access
4 Citations
2,271 Views
17 Pages

A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks

  • Xin Liu,
  • Jianwei Kong,
  • Lu Peng,
  • Dan Luo,
  • Gang Xu,
  • Xiubo Chen and
  • Xiaomeng Liu

1 December 2023

The secure computation of the graph structure is an important element in the field of secure calculation of graphs, which is important in querying data in graphs, since there are no algorithms for the graph edit distance problem that can resist attac...

  • Article
  • Open Access
1,073 Views
24 Pages

HE/MPC-Based Scheme for Secure Computing LCM/GCD and Its Application to Federated Learning

  • Xin Liu,
  • Xinyuan Guo,
  • Dan Luo,
  • Lanying Liang,
  • Wei Ye,
  • Yuchen Zhang,
  • Baohua Zhang,
  • Yu Gu and
  • Yu Guo

18 July 2025

Federated learning promotes the development of cross-domain intelligent applications under the premise of protecting data privacy, but there are still problems of sensitive parameter information leakage of multi-party data temporal alignment and reso...

  • Article
  • Open Access
9 Citations
3,690 Views
25 Pages

5 September 2022

EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitt...