Skip to Content
You are currently on the new version of our website. Access the old version .

87 Results Found

  • Article
  • Open Access
3 Citations
2,934 Views
18 Pages

Strong Designated Verifier Signature Scheme with Undeniability and Strong Unforgeability in the Standard Model

  • Xiaodong Yang,
  • Guilan Chen,
  • Ting Li,
  • Rui Liu,
  • Meiding Wang and
  • Caifen Wang

19 May 2019

Strong designated verifier signature can provide an efficient way to protect the identity privacy of the signer and the integrity of the data transmitted over the public channel. These characteristics make it very useful in outsourcing computing, ele...

  • Article
  • Open Access
16 Citations
3,856 Views
27 Pages

A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments

  • Xiaodong Yang,
  • Xizhen Pei,
  • Guilan Chen,
  • Ting Li,
  • Meiding Wang and
  • Caifen Wang

14 June 2019

With the widespread application of the Internet of Things (IoT), ensuring communication security for IoT devices is of considerable importance. Since IoT data are vulnerable to eavesdropping, tampering, forgery, and other attacks during an open netwo...

  • Article
  • Open Access
21 Citations
5,367 Views
13 Pages

Cyberaggression is often triggered by cybervictimization. However, little attention has been given to the underlying mechanisms in this relationship. Specifically, this study examined the mediating roles of stress as well as unforgiveness (i.e., reve...

  • Article
  • Open Access
2,134 Views
14 Pages

A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions

  • Jialu Hao,
  • Wei Wu,
  • Shuo Wang,
  • Xiaoge Zhong,
  • Guang Chu and
  • Feng Shao

21 December 2022

Attribute-based signature (ABS) assures the verifier that the message is endorsed by a signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide identity authentication with privacy preservation in scenarios like...

  • Article
  • Open Access
154 Views
26 Pages

Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations

  • Minghui Zheng,
  • Shicheng Huang,
  • Deju Kong,
  • Xing Fu,
  • Qiancheng Yao and
  • Wenyi Hou

22 January 2026

Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times. This functionality makes linkable ring sign...

  • Article
  • Open Access
9 Citations
3,685 Views
27 Pages

7 December 2022

Cybersecurity protocols enable several levels of protection against cyberattacks (digital attacks) that spread across network devices, platform programs, and network applications. On the Internet of Things (IoT), cyberattacks are generally intended t...

  • Article
  • Open Access
34 Citations
6,293 Views
15 Pages

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

  • Hongfei Zhu,
  • Yu-an Tan,
  • Liehuang Zhu,
  • Xianmin Wang,
  • Quanxin Zhang and
  • Yuanzhang Li

22 May 2018

With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols b...

  • Article
  • Open Access
8 Citations
9,015 Views
16 Pages

Background: The current study assessed forgiveness (positive forgiveness and reduced unforgiveness), self-consciousness (rumination and reflection), and physical and mental health. The aim of the study was to check if self-consciousness mediates the...

  • Article
  • Open Access
7 Citations
5,097 Views
8 Pages

Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption

  • Abdul Waheed,
  • Arif Iqbal Umar,
  • Nizamud Din,
  • Noor Ul Amin,
  • Saleem Abdullah and
  • Poom Kumam

24 August 2019

Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication. We...

  • Article
  • Open Access
7 Citations
4,711 Views
24 Pages

22 July 2023

Multi-signatures (MS) are a special type of public-key signature (PKS) in which multiple signers participate cooperatively to generate a signature for a single message. Recently, applications that use an MS scheme to strengthen the security of blockc...

  • Article
  • Open Access
14 Citations
5,285 Views
9 Pages

Lottery and Auction on Quantum Blockchain

  • Xin Sun,
  • Piotr Kulicki and
  • Mirek Sopek

5 December 2020

This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of a...

  • Article
  • Open Access
8 Citations
3,784 Views
10 Pages

30 November 2019

Assuming the availability of an existentially unforgeable signature scheme and an (IND- CCA secure) key encapsulation mechanism, we present a generic construction for group key establishment. The construction is designed with existing proposals for p...

  • Article
  • Open Access
4 Citations
3,230 Views
25 Pages

Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption

  • Haihe Ba,
  • Huaizhe Zhou,
  • Songzhu Mei,
  • Huidong Qiao,
  • Tie Hong,
  • Zhiying Wang and
  • Jiangchun Ren

21 September 2018

Cloud computing emerges as a change in the business paradigm that offers pay-as-you-go computing capability and brings enormous benefits, but there are numerous organizations showing hesitation for the adoption of cloud computing due to security conc...

  • Article
  • Open Access
5 Citations
4,863 Views
18 Pages

A Multi-Party Functional Signatures Scheme for Private Blockchain

  • Quan Zhou,
  • Yulong Zheng,
  • Kaijun Wei,
  • Minhui Chen and
  • Zhikang Zeng

Digital signature technology is essential for ensuring the authenticity and unforgeability of transactions in a private blockchain framework. In some scenarios, transactions require verification from multiple parties, each of whom needs to authentica...

  • Article
  • Open Access
6 Citations
5,043 Views
10 Pages

Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure...

  • Feature Paper
  • Article
  • Open Access
1 Citations
3,939 Views
24 Pages

On the Security of the Dandelion Protocol

  • Brian Goncalves and
  • Atefeh Mashatan

25 March 2022

In this paper, we review the peer-to-peer blockchain transaction protocol, Dandelion, and develop an oracle-based model for its network and security. We formalize a series of security and functional criteria, such as unforgeability, non-repudiation,...

  • Article
  • Open Access
6 Citations
2,772 Views
12 Pages

A Novel Linkable Ring Signature on Ideal Lattices

  • Chengtang Cao,
  • Lin You and
  • Gengran Hu

28 January 2023

In this paper, a novel linkable ring signature scheme is constructed. The hash value of the public key in the ring and the signer’s private key are based on random numbers. This setting makes it unnecessary to set the linkable label separately...

  • Article
  • Open Access
1 Citations
2,027 Views
17 Pages

11 August 2025

Distributed digital identity is an emerging identity management technology aimed at achieving comprehensive interconnectivity between digital objects. However, there is still the problem of privacy leakage in distributed identities, and selective dis...

  • Article
  • Open Access
524 Views
15 Pages

Quantum Digital Signature Using Entangled States for Network

  • Changho Hong,
  • Youn-Chang Jeong,
  • Osung Kwon and
  • Se-Wan Ji

20 November 2025

We propose an entanglement-based quantum digital signature (QDS) protocol optimized for quantum networks. The protocol follows the Lamport-inspired QDS paradigm but eliminates QKD post-processing by signing and verifying with raw conclusive keys, the...

  • Article
  • Open Access
31 Citations
5,454 Views
16 Pages

A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach

  • Insaf Ullah,
  • Noor Ul Amin,
  • Junaid Khan,
  • Muhammad Rehan,
  • Muhammad Naeem,
  • Hizbullah Khattak,
  • Shah Jahan Khattak and
  • Haseen Ali

31 July 2019

Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, publi...

  • Article
  • Open Access
4 Citations
1,740 Views
15 Pages

30 November 2023

Unmanned aerial vehicle (UAV) is an attractive application because of its flexibility and economy. It may use a digital signature scheme to protect commands sent to UAVs. Moreover, the digital signature scheme should guarantee the real-time performan...

  • Article
  • Open Access
5 Citations
2,719 Views
10 Pages

12 June 2021

When Mg-Gd-Y-Zr alloy is cold forged, a large number of nano-micro shear bands are formed inside the grains. It is observed that micro-shear bands hinder the sliding of dislocations, resulting in an increase in tensile strength at elevated temperatur...

  • Article
  • Open Access
878 Views
22 Pages

6 August 2025

Fuzzy signature (SIGF) is a type of digital signature that preserves the core functionalities of traditional signatures, while accommodating variations and non-uniformity in the signing key. This property enables the direct use of high-entropy fuzzy...

  • Article
  • Open Access
2 Citations
1,117 Views
21 Pages

Lightweight Group Signature Scheme Based on PUF for UAV Communication Security

  • Askar Sysoyev,
  • Karim Nauruzov,
  • Arijit Karati,
  • Olga Abramkina,
  • Yelizaveta Vitulyova,
  • Damelya Yeskendirova,
  • Yelena Popova and
  • Farida Abdoldina

10 October 2025

This paper presents a certificateless group signature scheme designed specifically for Unmanned Aerial Vehicle (UAV) communications in resource-constrained environments. The scheme leverages Physical Unclonable Functions (PUFs) and elliptic curve cry...

  • Article
  • Open Access
19 Citations
4,563 Views
13 Pages

A New Quantum Blind Signature Scheme with BB84-State

  • Feng-Lin Chen,
  • Zhi-Hua Wang and
  • Yong-Mo Hu

28 March 2019

The blind signature is widely used in cryptography applications because it can prevent the signer from gaining the original message. Owing to the unconditional security, the quantum blind signature is more advantageous than the classical one. In this...

  • Article
  • Open Access
4 Citations
2,174 Views
20 Pages

7 January 2023

The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility and complete anonymity. I...

  • Article
  • Open Access
1 Citations
1,534 Views
23 Pages

Revocable Signature Scheme with Implicit and Explicit Certificates

  • Jerzy Pejaś,
  • Tomasz Hyla and
  • Wojciech Zabierowski

9 September 2023

This paper addresses the certificate revocation problem and proposes the first revocable pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA). We should no longer discuss whether to revoke certificates but how to do i...

  • Article
  • Open Access
224 Views
17 Pages

19 January 2026

To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a tr...

  • Article
  • Open Access
2 Citations
1,738 Views
16 Pages

10 December 2024

Intelligent systems are those in which behavior is determined by environmental inputs, and actions are taken to maximize the probability of achieving specific goals. Intelligent systems are widely applied across various fields, particularly in distri...

  • Article
  • Open Access
4 Citations
2,089 Views
16 Pages

12 January 2024

A transitive signature scheme enables anyone to obtain the signature on edge (i,k) by combining the signatures on edges (i,j) and (j,k), but it suffers from signature theft and signature abuse. The existing work has solved these problems using a univ...

  • Article
  • Open Access
18 Citations
2,929 Views
18 Pages

19 October 2021

Message authentication is crucial because it encourages participants to accept countermeasures and further transmit messages to legitimate users in a network while maintaining the legitimacy of the identity of network members. An unauthorized user ca...

  • Article
  • Open Access
24 Citations
6,251 Views
14 Pages

21 July 2021

Small and medium enterprises (SMEs) play an important role in promoting the national economy and providing employment opportunities. E-commerce platforms may facilitate transactions between these enterprises. However, transactions on the e-commerce p...

  • Article
  • Open Access
20 Citations
7,966 Views
14 Pages

Pairing Free Identity-Based Blind Signature Scheme with Message Recovery

  • Salome James,
  • N.B. Gayathri and
  • P. Vasudeva Reddy

With the rapid development of modern technology, personal privacy has become a critical concern in many applications. Various digitalized applications such as online voting systems and the electronic cash systems need authenticity and anonymity. Blin...

  • Article
  • Open Access
4 Citations
4,980 Views
28 Pages

QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong Identities

  • Dimitrios Kounas,
  • Orfefs Voutyras,
  • Georgios Palaiokrassas,
  • Antonios Litke and
  • Theodora Varvarigou

Location-based services are becoming extremely popular due to the widespread use of smartphones and other mobile and portable devices. These services mainly rely on the sincerity of users, who can spoof the location they report to them. For applicati...

  • Article
  • Open Access
2 Citations
3,704 Views
28 Pages

ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System

  • Annapureddy Venkata Sai Kumar Reddy and
  • Gourinath Banda

16 December 2024

The widespread reliance on paper-based currency poses significant drawbacks, such as counterfeiting, lack of transparency, and environmental impacts. While Central Bank Digital Currencies (CBDCs) address many of these issues, their dependence on cont...

  • Article
  • Open Access
2 Citations
1,210 Views
16 Pages

Unmanned aerial vehicles (UAVs) are highly versatile and cost-effective, making them an attractive option for various applications. In UAV networks, it is essential to implement a digital signature scheme to ensure the integrity and authentication of...

  • Article
  • Open Access
10 Citations
2,882 Views
15 Pages

Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

  • Fengyin Li,
  • Mengjiao Yang,
  • Zhihao Song,
  • Ping Wang and
  • Guoping Li

2 August 2023

Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign. Existing Proxy-BS schemes are based on tr...

  • Article
  • Open Access
15 Citations
4,261 Views
17 Pages

Lattice-Based Revocable Certificateless Signature

  • Ying-Hao Hung,
  • Yuh-Min Tseng and
  • Sen-Shan Huang

20 October 2017

Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previou...

  • Article
  • Open Access
4 Citations
3,105 Views
20 Pages

Achieving Anonymous and Covert Reporting on Public Blockchain Networks

  • Liehuang Zhu,
  • Jiaqi Zhang,
  • Can Zhang,
  • Feng Gao,
  • Zhuo Chen and
  • Zhen Li

27 March 2023

Reporting helps to combat illegal activities and deters lawbreakers and potential lawbreakers. From ancient times to the present, public authorities have usually rewarded effective reporting information to build harmonious societies. In this process,...

  • Article
  • Open Access
18 Citations
10,161 Views
21 Pages

A Traceable Online Will System Based on Blockchain and Smart Contract Technology

  • Chin-Ling Chen,
  • Ching-Ying Lin,
  • Mao-Lun Chiang,
  • Yong-Yuan Deng,
  • Peizhi Chen and
  • Yi-Jui Chiu

12 March 2021

In recent years, with the rapid levels of economic development, there have been more and more problems in property inheritance and distribution. In today’s society, people still have many taboos when writing a will. Writing a will not only involves v...

  • Article
  • Open Access
2 Citations
2,005 Views
28 Pages

6 December 2023

The Internet of Vehicles (IoV) improves traffic efficiency and enhances driving safety through the real-time collection and analysis of traffic-related data. Numerous secure and privacy-preserving communication protocols have been proposed for the Io...

  • Article
  • Open Access
25 Citations
5,041 Views
18 Pages

Towards Secure Searchable Electronic Health Records Using Consortium Blockchain

  • Muneera Alsayegh,
  • Tarek Moulahi,
  • Abdulatif Alabdulatif and
  • Pascal Lorenz

20 April 2022

There are significant data privacy implications associated with Electronic Health Records (EHRs) sharing among various untrusted healthcare entities. Recently, a blockchain-based EHRs sharing system has provided many benefits. Decentralization, anony...

  • Article
  • Open Access
1 Citations
1,337 Views
19 Pages

22 October 2024

To address the deficiencies in privacy-preserving expressive query and verification mechanisms in outsourced key-value stores, we propose EKV-VBQ, a scheme designed to ensure verifiable Boolean queries over encrypted key-value data. We have integrate...

  • Article
  • Open Access
2 Citations
6,623 Views
19 Pages

Ring signatures are widely used in e-voting, anonymous whistle-blowing systems, and blockchain transactions. However, due to the anonymity of ring signatures, a signer can sign the same message multiple times, potentially leading to repeated voting o...

  • Article
  • Open Access
1 Citations
1,823 Views
16 Pages

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes

  • Fengyin Li,
  • Junhui Wang,
  • Mengxue Shang,
  • Dandan Zhang and
  • Tao Li

2 August 2023

The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective...

  • Article
  • Open Access
23 Citations
6,002 Views
25 Pages

14 February 2021

The digital rights management of museums is a mechanism that protects digital content from being abused by controlling and managing its usage rights. Traditional museums attach importance to the collection, display, research, and education functions...

  • Article
  • Open Access
619 Views
19 Pages

21 July 2025

The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commo...

  • Article
  • Open Access
2 Citations
1,815 Views
18 Pages

23 November 2023

The certificateless online/offline aggregate signcryption scheme combines the characteristics of the certificateless aggregate signcryption scheme and the online/offline encryption scheme, which can increase efficiency while simultaneously reducing c...

  • Article
  • Open Access
17 Citations
3,404 Views
19 Pages

An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles

  • Insaf Ullah,
  • Muhammad Asghar Khan,
  • Mohammed H. Alsharif and
  • Rosdiadee Nordin

30 September 2021

Internet of Vehicles (IoV) is a specialized breed of Vehicular Ad-hoc Networks (VANETs) in which each entity of the system can be connected to the internet. In the provision of potentially vital services, IoV transmits a large amount of confidential...

of 2