Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Secure Energy Internet Scheme for IoV Based on Post-Quantum Blockchain

    Jiansheng Zhang1, Yang Xin1,*, Yuyan Wang2, Xiaohui Lei2, Yixian Yang1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6323-6336, 2023, DOI:10.32604/cmc.2023.034668

    Abstract With the increasing use of distributed electric vehicles (EV), energy management in the Internet of vehicles (IoV) has attracted more attention, especially demand response (DR) management to achieve efficient energy management in IoV. Therefore, it is a tendency to introduce distributed energy such as renewable energy into the existing supply system. For optimizing the energy internet (EI) for IoV, in this paper, we introduce blockchain into energy internet and propose a secure EI scheme for IoV based on post-quantum blockchain, which provides the new information services and an incentive cooperation mechanism for the current energy IoV system. Firstly, based on… More >

  • Open Access

    ARTICLE

    A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain

    Meng-Wei Zhang1, Xiu-Bo Chen1, Haseeb Ahmad2, Gang Xu3,4,*, Yi-Xian Yang1

    Journal of Cyber Security, Vol.4, No.1, pp. 29-39, 2022, DOI:10.32604/jcs.2022.027693

    Abstract Blockchain has a profound impact on all areas of society by virtue of its immutability, decentralization and other characteristics. However, blockchain faces the problem of data privacy leakage during the application process, and the rapid development of quantum computing also brings the threat of quantum attack to blockchain. In this paper, we propose a lattice-based certificateless fully homomorphic encryption (LCFHE) algorithm based on approximate eigenvector firstly. And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme, which is composed of the private key together with the secret value… More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of the blockchain, and threaten the… More >

  • Open Access

    ARTICLE

    Post-Quantum Blockchain over Lattice

    Xiao Zhang1, 2, 3, Faguo Wu1, 2, 3, Wang Yao1, 2, 3, *, Wenhua Wang4, Zhiming Zheng1, 2, 3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 845-859, 2020, DOI:10.32604/cmc.2020.08008

    Abstract Blockchain is an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies, and has recently attracted intensive attention from governments, financial institutions, high-tech enterprises, and the capital markets. Its cryptographic security relies on asymmetric cryptography, such as ECC, RSA. However, with the surprising development of quantum technology, asymmetric cryptography schemes mentioned above would become vulnerable. Recently, lattice-based cryptography scheme was proposed to be secure against attacks in the quantum era. In 2018, with the aid of Bonsai Trees technology, Yin et al. [Yin, Wen, Li et al. (2018)] proposed a lattice-based authentication method which can extend a… More >

Displaying 1-10 on page 1 of 4. Per Page