Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing

    Asma Ibrahim Hussein1,*, Abeer Tariq MaoLood2, Ekhlas Khalaf Gbashi2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 753-769, 2023, DOI:10.32604/cmc.2023.039804

    Abstract With the advent of quantum computing, numerous efforts have been made to standardize post-quantum cryptosystems with the intention of (eventually) replacing Elliptic Curve Cryptography (ECC) and Rivets-Shamir-Adelman (RSA). A modified version of the traditional N-Th Degree Truncated Polynomial Ring (NTRU) cryptosystem called NTRU Prime has been developed to reduce the attack surface. In this paper, the Signcryption scheme was proposed, and it is most efficient than others since it reduces the complexity and runs the time of the code execution, and at the same time, provides a better security degree since it ensures the integrity of the sent message, confidentiality… More >

  • Open Access

    ARTICLE

    Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm

    Faguo Wu1,2,3,4,*, Bo Zhou2, Jie Jiang5, Tianyu Lei1, Jiale Song1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 957-973, 2023, DOI:10.32604/cmc.2023.038771

    Abstract With the rapid increase in demand for data trustworthiness and data security, distributed data storage technology represented by blockchain has received unprecedented attention. These technologies have been suggested for various uses because of their remarkable ability to offer decentralization, high autonomy, full process traceability, and tamper resistance. Blockchain enables the exchange of information and value in an untrusted environment. There has been a significant increase in attention to the confidentiality and privacy preservation of blockchain technology. Ensuring data privacy is a critical concern in cryptography, and one of the most important protocols used to achieve this is the secret-sharing method.… More >

  • Open Access

    ARTICLE

    Code-based Sequential Aggregate Signature Scheme

    Bennian Dou1,*, Lei Xu1, Xiaoling Yu2, Lin Mei1, Cong Zuo3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5219-5231, 2022, DOI:10.32604/cmc.2022.030270

    Abstract This paper proposes the first code-based quantum immune sequential aggregate signature (SAS) scheme and proves the security of the proposed scheme in the random oracle model. Aggregate signature (AS) schemes and sequential aggregate signature schemes allow a group of potential signers to sign different messages respectively, and all the signatures of those users on those messages can be aggregated into a single signature such that the size of the aggregate signature is much smaller than the total size of all individual signatures. Because of the aggregation of many signatures into a single short signature, AS and SAS schemes can reduce… More >

Displaying 1-10 on page 1 of 3. Per Page