Zia Ullah Bashir et al., 2021 - Google Patents
Cryptanalysis and improvement of a blind multi-document signcryption schemeZia Ullah Bashir et al., 2021
- Document ID
- 7360060748898176704
- Author
- Zia Ullah Bashir M
- Ali R
- Publication year
- Publication venue
- Cryptologia
External Links
Snippet
Blind signcryption is used to maintain the anonymity and privacy of the sender from other participants in an unsecured public network. It has vast applications for privacy related mechanisms such as electronic voting and electronic auction systems. Various blind …
- 238000000034 method 0 description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3091690B1 (en) | Rsa decryption using multiplicative secret sharing | |
Hsu et al. | New nonrepudiable threshold proxy signature scheme with known signers | |
Herranz | Deterministic identity-based signatures for partial aggregation | |
Tan | A chaotic maps-based authenticated key agreement protocol with strong anonymity | |
Chou et al. | Two ID-based authenticated schemes with key agreement for mobile environments | |
Liao et al. | Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement | |
Tanwar et al. | Efficient and secure multiple digital signature to prevent forgery based on ECC | |
Sarde et al. | A secure ID-based blind and proxy blind signature scheme from bilinear pairings | |
Bashir et al. | Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve | |
Ullah et al. | Blind signcryption scheme based on hyper elliptic curves cryptosystem | |
Singh et al. | Public integrity auditing for shared dynamic cloud data | |
Tan | An enhanced three-party authentication key exchange protocol for mobile commerce environments. | |
Li et al. | A new self-certified signature scheme based on ntrus ing for smart mobile communications | |
Gupta et al. | Matrix modification of RSA digital signature scheme | |
Stallings | Digital signature algorithms | |
Ogundoyin | An anonymous lightweight authentication scheme with scalability for trustworthy pervasive social networking | |
Tahat et al. | Hybrid publicly verifiable authenticated encryption scheme based on chaotic maps and factoring problems | |
Zia Ullah Bashir et al. | Cryptanalysis and improvement of a blind multi-document signcryption scheme | |
Al-Saidi et al. | Improved digital signature protocol using iterated function systems | |
Shiraishi et al. | A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service. | |
Biswas | Establishment of authenticated secret session keys using digital signature standard | |
Bodasingi et al. | New Digital Signature Scheme Based on RSA Using Circulant Matrix | |
Guo et al. | Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme | |
Wu et al. | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | |
Chen et al. | A practical authenticated encryption scheme based on the elliptic curve cryptosystem |