Digital signature ≈ Digital signature
View article: CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme Open
In this paper, we present the lattice-based signature scheme Dilithium, which is a component of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) suite that was submitted to NIST’s call for post-quantum cryptographic standards. The…
View article
Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems Open
Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare an…
View article
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process Open
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital sig…
View article
A Conceptual Secure Blockchain Based Electronic Voting System Open
Blockchain is offering new opportunities to develop new types of digital services.While research on the topic is still emerging, it has mostly focused on the technical and legal issues instead of taking advantage of this novel concept and …
View article
Ring Confidential Transactions Open
This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process havi…
View article
Fast Multiparty Threshold ECDSA with Fast Trustless Setup Open
A threshold signature scheme enables distributed signing among n players such that any subgroup of size $t+1$ can sign, whereas any group with t or fewer players cannot. While there exist previous threshold schemes for the ECDSA signature …
View article
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures Open
Recent work, including ZKBoo, ZKB++, and Ligero, has developed efficient non-interactive zero-knowledge proofs of knowledge (NIZKPoKs) for Boolean circuits based on symmetric-key primitives alone, using the "MPC-in-the-head" paradigm of Is…
View article
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain Open
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certifi…
View article
Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts Open
There is an immense need of a proof of delivery (PoD) of today's digital media and content, especially those that are subject to payment. Current PoD systems are mostly centralized and heavily dependent on a trusted third party (TTP) espec…
View article
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain Open
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still …
View article
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process Open
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital sig…
View article
Blockchain for Modern Applications: A Survey Open
Blockchain is a modern technology that has revolutionized the way society interacts and trades. It could be defined as a chain of blocks that stores information with digital signatures in a distributed and decentralized network. This techn…
View article
Digital signature scheme for information non-repudiation in blockchain: a state of the art review Open
Blockchain, as one of the most promising technology, has attracted tremendous attention. The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of informa…
View article
A comparative study of Message Digest 5(MD5) and SHA256 algorithm Open
The document is a collection of written or printed data containing information. The more rapid advancement of technology, the integrity of a document should be kept. Because of the nature of an open document means the document contents can…
View article
Secure quantum signatures using insecure quantum channels Open
Digital signatures are widely used in modern communication to guarantee\nauthenticity and transferability of messages, The security of currently used\nclassical schemes relies on computational assumptions. We present a quantum\nsignature s…
View article
An Anti-Quantum Transaction Authentication Approach in Blockchain Open
Blockchain is a new distributed and decentralized technology, and gradually attracts worldwide attention, but it is vulnerable to quantum attacks that would solve elliptic curve digital logarithm problem, which is mainly used for transacti…
View article
Research on the Application of Cryptography on the Blockchain Open
Blockchain is an innovative application model that integrates distributed data storage, peer-to-peer transmission, consensus mechanisms, digital encryption technology and other computer technologies. It is decentralized, secure, and Inform…
View article
On the Security of Two-Round Multi-Signatures Open
A multi-signature scheme allows a group of signers to collaboratively sign a message, creating a single signature that convinces a verifier that every individual signer approved the message. The increased interest in technologies to decent…
View article
A Survey of Post-Quantum Cryptography: Start of a New Race Open
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quant…
View article
Practical quantum digital signature Open
Guaranteeing nonrepudiation, unforgeability as well as transferability of a\nsignature is one of the most vital safeguards in today's e-commerce era. Based\non fundamental laws of quantum physics, quantum digital signature (QDS) aims to\np…
View article
Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Open
International audience
View article
Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status Open
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security. P…
View article
Digital Signature Standard (DSS) Open
This standard specifies a suite of algorithms that can be used to generate a digital signature.Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory.In addition, the reci…
View article
Digital Signature Standard (DSS) Open
This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the re…
View article
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature Open
The Internet of Things (IoT) is also known as the Internet of everything. As an important part of the new generation of intelligent information technology, the IoT has attracted the attention both of researchers and engineers all over the …
View article
Educational Blockchain: A Secure Degree Attestation and Verification Traceability Architecture for Higher Education Commission Open
Degree attestation verification and traceability are complex one-to-one processes between the Higher Education Commission (HEC) and universities. The procedure shifted to the digitalized manner, but still, on a certain note, manual authent…
View article
Digital Forensics Architecture for Evidence Collection and Provenance Preservation in IaaS Cloud Environment Using SDN and Blockchain Technology Open
Cloud forensics is an intelligent evolution of digital forensics that defends against cyber-crimes. However, centralized evidence collection and preservation minimizes the reliability of digital evidence. To resolve this severe problem, th…
View article
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration Open
Over the Internet, digital signature has been an indispensable approach to securing e-commerce and other online transactions requiring authentication. Concerning the computing costs of signature generation and verification, it has become a…
View article
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT Open
As a method for increasing throughput and improving reliability of routing, network coding has been widely used in decentralized IoT systems. When files are shared in the system, network coding signature techniques can help authenticate wh…
View article
Improved Recurrent Neural Network Schema for Validating Digital Signatures in VANET Open
Vehicular ad hoc networks (VANETs) allow communication between stationary or moving vehicles with the assistance of wireless technology. Among various existing issues in smart VANETs, secure communication is the key challenge in VANETs wit…