Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Lunzhi Deng"'
Publikováno v:
Sensors, Vol 24, Iss 15, p 4899 (2024)
A Wireless Body Area Network (WBAN), introduced into the healthcare sector to improve patient care and enhance the efficiency of medical services, also brings the risk of the leakage of patients’ privacy. Therefore, maintaining the communication se
Externí odkaz:
https://doaj.org/article/ee85cad6a16c4cf5bc7c656f1922b7b7
Publikováno v:
IEEE Access, Vol 9, Pp 78017-78024 (2021)
Blind signature is a special type of digital signature, the signer cannot see the specific content signed. However, blindness may cause users to abuse their rights. Partial blind signature allows the signer to embed pre-negotiated public information
Externí odkaz:
https://doaj.org/article/3b803f017e724ee08ca1fb3ca7aa4b40
Publikováno v:
IEEE Access, Vol 8, Pp 54641-54651 (2020)
Ring signature is an anonymous signature that both authenticates the message and protects the identity information of the signer. It is suitable for scenarios such as anonymous network access, online auctions, etc. However, there is a problem in a re
Externí odkaz:
https://doaj.org/article/8bed951afe744722b5a1fe02371c8667
Publikováno v:
IEEE Access, Vol 8, Pp 206396-206405 (2020)
Cloud storage enables data owners to use any device to store and access data anytime, anywhere. In a data auditing scheme, the data owner can entrust a third party auditor (TPA) to verify that the outsourced data remains unchanged. A secure data audi
Externí odkaz:
https://doaj.org/article/e8462796b1de471ca23575b040ef6a1e
Publikováno v:
IEEE Access, Vol 7, Pp 87162-87168 (2019)
Today, data is exploding. A large amount of data needs to be processed in a timely and an efficient manner. Aggregate signatures are an efficient and secure way to handle large numbers of digital signatures. In an aggregate signature scheme, n signat
Externí odkaz:
https://doaj.org/article/5b77b50817f24feda484676f4e84c875
Publikováno v:
IEEE Access, Vol 7, Pp 153969-153976 (2019)
A ring signature is an anonymous signature that implements both the authentication of the message and the anonymity of the signer. In a “normal” ring signature scheme, the same signer can generate multiple ring signatures, but the verifier cannot
Externí odkaz:
https://doaj.org/article/215fcaa6b6ac432e87a069e5e91c0b9f
Publikováno v:
Applied Sciences, Vol 12, Iss 15, p 7401 (2022)
Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since the multiplication is actually an ordinary addition of numbers and there is no ordinary multiplication of num
Externí odkaz:
https://doaj.org/article/13ec70b819444bd6b2f229a2eb1d6a51
Publikováno v:
IEEE Systems Journal. 17:1304-1315
Publikováno v:
IEEE Internet of Things Journal. 10:57-65
Publikováno v:
網際網路技術學刊. 23:279-288
Proxy signature frees the original signer from the heavy signature work. Many certificateless proxy signature (CLPS) schemes have been proposed in the last ten years. The security proofs of most known schemes are given in the random oracle model (ROM