Yu et al., 2021 - Google Patents
Certificateless network coding ring signature schemeYu et al., 2021
View PDF- Document ID
- 18421392634040133192
- Author
- Yu H
- Wang W
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Traditional certificateless ring signature is not suitable for the network coding environment. In this view, a new certificateless network coding ring signature (CL‐NCRS) is devised by using the techniques of multisource network coding and certificateless ring signature …
- 238000004891 communication 0 abstract description 13
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/50—Techniques for reducing energy-consumption in wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | Certificateless Key‐Insulated Generalized Signcryption Scheme without Bilinear Pairings | |
Emura et al. | Generic constructions of secure‐channel free searchable encryption with adaptive security | |
Tu et al. | Reattack of a certificateless aggregate signature scheme with constant pairing computations | |
Noroozi et al. | Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks | |
Yu et al. | Certificateless network coding ring signature scheme | |
Jing | An efficient homomorphic aggregate signature scheme based on lattice | |
Mao et al. | Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices | |
Zhang et al. | A Lattice‐Based Identity‐Based Proxy Blind Signature Scheme in the Standard Model | |
Liu et al. | Offline/online attribute‐based encryption with verifiable outsourced decryption | |
Miao et al. | Revocable and anonymous searchable encryption in multi‐user setting | |
Noh et al. | Strong designated verifier signature scheme from lattices in the standard model | |
Zhu et al. | An Efficient Identity‐Based Proxy Blind Signature for Semioffline Services | |
El Gafif et al. | Efficient Ciphertext‐Policy Attribute‐Based Encryption Constructions with Outsourced Encryption and Decryption | |
Wu et al. | A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT | |
Teng et al. | Dynamic asymmetric group key agreement protocol with traitor traceability | |
Zhou et al. | An Efficient Code‐Based Threshold Ring Signature Scheme with a Leader‐Participant Model | |
Deng et al. | Certificateless short signature scheme from pairing in the standard model | |
Thorncharoensri et al. | Secure and Efficient Communication in VANETs Using Level‐Based Access Control | |
Zhang et al. | Efficient multiple sources network coding signature in the standard model | |
Yan et al. | Identity‐based signcryption from lattices | |
Xie et al. | A New Lattice‐Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems | |
Tseng et al. | Anonymous Multireceiver Identity‐Based Encryption against Chosen‐Ciphertext Attacks with Tight Reduction in the Standard Model | |
Zhou et al. | A unidirectional certificateless proxy re‐signature scheme based on lattice | |
Meng | Directly revocable ciphertext-policy attribute-based encryption from lattices | |
Sarier | A new biometric identity based encryption scheme secure against DoS attacks |