Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Electricity Carbon Quota Trading Scheme based on Certificateless Signature and Blockchain

    Xiaodong Yang1,4, Runze Diao1,*, Tao Liu2, Haoqi Wen1, Caifen Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1695-1712, 2024, DOI:10.32604/cmes.2023.029461

    Abstract The carbon trading market can promote “carbon peaking” and “carbon neutrality” at low cost, but carbon emission quotas face attacks such as data forgery, tampering, counterfeiting, and replay in the electricity trading market. Certificateless signatures are a new cryptographic technology that can address traditional cryptography’s general essential certificate requirements and avoid the problem of crucial escrow based on identity cryptography. However, most certificateless signatures still suffer from various security flaws. We present a secure and efficient certificateless signing scheme by examining the security of existing certificateless signature schemes. To ensure the integrity and verifiability of electricity carbon quota trading, we… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    ARTICLE

    Cryptanalysis of an Online/Offline Certificateless Signature Scheme for Internet of Health Things

    Saddam Hussain1, Syed Sajid Ullah2,*, Mohammad Shorfuzzaman3, Mueen Uddin4, Mohammed Kaosar5

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 983-993, 2021, DOI:10.32604/iasc.2021.019486

    Abstract Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal of Healthcare Engineering, vol. 2020] presented a new certificateless offline/online signature scheme for Internet of Health Things (IoHT) to fulfill the authenticity requirements of the resource-constrained environment of (IoHT) devices. The authors claimed that the newly proposed scheme is formally secured against Type-I adversary under the Random Oracle Model (ROM). Unfortunately, their scheme is insecure against adaptive chosen message attacks. It is demonstrated that an adversary can forge a valid signature on a message by replacing the public key. Furthermore, we performed a comparative analysis… More >

Displaying 1-10 on page 1 of 3. Per Page