[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yu et al., 2021 - Google Patents

Certificateless network coding ring signature scheme

Yu et al., 2021

View PDF @Full View
Document ID
18421392634040133192
Author
Yu H
Wang W
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Traditional certificateless ring signature is not suitable for the network coding environment. In this view, a new certificateless network coding ring signature (CL‐NCRS) is devised by using the techniques of multisource network coding and certificateless ring signature …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BINDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B60/00Information and communication technologies [ICT] aiming at the reduction of own energy use
    • Y02B60/50Techniques for reducing energy-consumption in wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave

Similar Documents

Publication Publication Date Title
Zhou et al. Certificateless Key‐Insulated Generalized Signcryption Scheme without Bilinear Pairings
Emura et al. Generic constructions of secure‐channel free searchable encryption with adaptive security
Tu et al. Reattack of a certificateless aggregate signature scheme with constant pairing computations
Noroozi et al. Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks
Yu et al. Certificateless network coding ring signature scheme
Jing An efficient homomorphic aggregate signature scheme based on lattice
Mao et al. Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices
Zhang et al. A Lattice‐Based Identity‐Based Proxy Blind Signature Scheme in the Standard Model
Liu et al. Offline/online attribute‐based encryption with verifiable outsourced decryption
Miao et al. Revocable and anonymous searchable encryption in multi‐user setting
Noh et al. Strong designated verifier signature scheme from lattices in the standard model
Zhu et al. An Efficient Identity‐Based Proxy Blind Signature for Semioffline Services
El Gafif et al. Efficient Ciphertext‐Policy Attribute‐Based Encryption Constructions with Outsourced Encryption and Decryption
Wu et al. A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
Teng et al. Dynamic asymmetric group key agreement protocol with traitor traceability
Zhou et al. An Efficient Code‐Based Threshold Ring Signature Scheme with a Leader‐Participant Model
Deng et al. Certificateless short signature scheme from pairing in the standard model
Thorncharoensri et al. Secure and Efficient Communication in VANETs Using Level‐Based Access Control
Zhang et al. Efficient multiple sources network coding signature in the standard model
Yan et al. Identity‐based signcryption from lattices
Xie et al. A New Lattice‐Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems
Tseng et al. Anonymous Multireceiver Identity‐Based Encryption against Chosen‐Ciphertext Attacks with Tight Reduction in the Standard Model
Zhou et al. A unidirectional certificateless proxy re‐signature scheme based on lattice
Meng Directly revocable ciphertext-policy attribute-based encryption from lattices
Sarier A new biometric identity based encryption scheme secure against DoS attacks