Showing 21 - 40 results of 262 for search '"cryptographer"', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article
  10. 30
  11. 31

    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications by Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez, Doris Esenarro Vargas

    Published 2021-01-01
    “…This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. …”
    Get full text
    Article
  12. 32

    A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges by Donagani Ramakrishna, Mohammed Ali Shaik

    Published 2025-01-01
    “…Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. …”
    Get full text
    Article
  13. 33

    A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation by Abid Mahboob, Muhammad Asif, Muhammad Nadeem, Aysha Saleem, Sayed M. Eldin, Imran Siddique

    Published 2022-01-01
    “…In this article, we proposed a novel technique to generate cryptographically strong S-box by using fractional transformation based on finite field. …”
    Get full text
    Article
  14. 34

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. …”
    Get full text
    Article
  15. 35

    Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform by Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU

    Published 2022-12-01
    “…With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic curve public key cryptography proposed by the State Cryptography Administration is an elliptic curve public key cryptography algorithm developed domestically, which has the advantages of high security and short key.SM2 has been widely deployed in various communication systems and is used in essential parts such as identity authentication and key negotiation.However, since SM2 involves large integer operations on finite fields, the computational cost is high, and its execution on a low-power embedded platform seriously affects the user experience.Therefore, an efficient implementation scheme of SM2 algorithm for low-power embedded platform was proposed for ARM-m series processors.Specifically, Thumb-2 instruction set was adopted to handle carry and save addressing cycles, basic operations such as modulo addition and sub-traction of large integers were optimized, and the number of available registers on the platform was combined to build efficient basic operations.Besides, based on the short multiplication and accumulation instruction cycle of ARM-m series processors, the implementation of Montgomery multiplication was optimized, and an efficient modular multiplication scheme was designed in combination with the CIOS algorithm.The scheme was no longer limited to Mersenne primes, and greatly improved the speed and flexibility of modular multiplication.Based on the theoretical analysis and experimental test, the window length selection method of the multiple point-scalar multiplication wNAF sliding window method on the embedded platform was given.The experimental test results show that the proposed scheme can effectively improve the computational efficiency of the SM2 algorithm on the resource-constrained low-power embedded platform.Without pre-calculation, the test signature speed can reach 0.204s/time, the signature verification speed is 0.388s/time, the encryption speed is 0.415s/time, and the decryption speed is 0.197s/time.…”
    Get full text
    Article
  16. 36

    Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 by Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG

    Published 2022-12-01
    “…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
    Get full text
    Article
  17. 37
  18. 38

    A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review by Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, Serhat Yuksel, Hasan Dincer, Roobaea Alroobaea, Abdullah M. Baqasah, Uma Chinta

    Published 2024-01-01
    “…At the end of this systematic review, we investigated a few open research problems and mentioned those that are involved in the design of cryptographic re-encryption enabled IS for future Industry 5.0 developments.…”
    Get full text
    Article
  19. 39
  20. 40

    LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory by Fusheng Wu, Jinhui Liu, Yanbin Li, Mingtao Ni

    Published 2024-01-01
    “…The aim is to analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol, to ensure the security of the cryptographic protocol when it is encoded into software and implemented. …”
    Get full text
    Article