Journal articles on the topic 'Pairing Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Pairing Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chin, Ji-Jian, Syh-Yuan Tan, Swee-Huay Heng, and Raphael Chung-Wei Phan. "Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme." Scientific World Journal 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/237514.
Full textLiu, Wenhao, Qi Xie, Shengbao Wang, Lidong Han, and Bin Hu. "Pairing-Free Certificateless Signature with Security Proof." Journal of Computer Networks and Communications 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/792063.
Full textLuc, Nhu-Quynh, Quang-Trung Do, and Manh-Hung Le. "Implementation of Boneh - Lynn - Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves." Ministry of Science and Technology, Vietnam 64, no. 12 (December 15, 2022): 3–9. http://dx.doi.org/10.31276/vjste.64(4).03-09.
Full textSugiyama, Masaki, Aohan Li, Zengchao Duan, Makoto Naruse, and Mikio Hasegawa. "BER Minimization by User Pairing in Downlink NOMA Using Laser Chaos Decision-Maker." Electronics 11, no. 9 (April 30, 2022): 1452. http://dx.doi.org/10.3390/electronics11091452.
Full textZhang, Jian Hong, Hua Chen, and Yi Xian Yang. "Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion." Key Engineering Materials 439-440 (June 2010): 1265–70. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1265.
Full textKiran, Medikonda Asha, Syam Kumar Pasupuleti, and R. Eswari. "Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–15. http://dx.doi.org/10.4018/ijcac.305216.
Full textGao, Ronghai, Jiwen Zeng, and Lunzhi Deng. "Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings." Mathematical Problems in Engineering 2018 (July 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/1486437.
Full textDONG, GUOFAGN, FEI GAO, WENBO SHI, and PENG GONG. "An efficient certificateless blind signature scheme without bilinear pairing." Anais da Academia Brasileira de Ciências 86, no. 2 (June 2014): 1003–11. http://dx.doi.org/10.1590/0001-3765201420130199.
Full textChin, Ji-Jian, Syh-Yuan Tan, Swee-Huay Heng, and Raphael C. W. Phan. "Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes." Scientific World Journal 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/170906.
Full textYang, Kaiqin. "An enhanced pairing-free certificateless directed signature scheme." PLOS ONE 17, no. 2 (February 17, 2022): e0263943. http://dx.doi.org/10.1371/journal.pone.0263943.
Full textDeng, Lunzhi, Jiwen Zeng, and Huawei Huang. "Efficient Certificateless Proxy Signature Scheme." International Journal of Foundations of Computer Science 27, no. 01 (January 2016): 85–100. http://dx.doi.org/10.1142/s0129054116500064.
Full textMa, Mimi, Min Luo, Shuqin Fan, and Dengguo Feng. "An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT." Wireless Communications and Mobile Computing 2020 (December 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/8850520.
Full textChatterjee, Sanjit, M. Prem Laxman Das, and R. Kabaleeshwaran. "Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis." Journal of Mathematical Cryptology 12, no. 3 (September 1, 2018): 159–90. http://dx.doi.org/10.1515/jmc-2017-0042.
Full textMishra, Shivendu, Ritika Yaduvanshi, Anjani Kumar Rai, and Nagendra Pratap Singh. "An ID-Based Signature Scheme from Bilinear Pairing Based on Ex-K-Plus Problem." Advanced Materials Research 403-408 (November 2011): 929–34. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.929.
Full textLu, Erl Huei, Henry Ker Chang Chang, Shu Hwang Liaw, and Pin Chang Su. "Proven Security and Efficiency of Gap Diffie-Hellman Group Blind Signature in E-Commerce." Applied Mechanics and Materials 284-287 (January 2013): 3522–26. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3522.
Full textDing, Yi. "Certificateless Multi-Signcryption Scheme without Pairing." Applied Mechanics and Materials 599-601 (August 2014): 1435–38. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1435.
Full textLIU, Wen-Hao, and Chun-Xiang XU. "Certificateless Signcryption Scheme Without Bilinear Pairing." Journal of Software 22, no. 8 (September 9, 2011): 1918–26. http://dx.doi.org/10.3724/sp.j.1001.2011.03891.
Full textJames, Salome, Gowri Thumbur, and Vasudeva Reddy P. "Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 117–37. http://dx.doi.org/10.4018/ijisp.2021010106.
Full textGao, Ronghai, Jiwen Zeng, and Lunzhi Deng. "An efficient certificateless multi-receiver threshold decryption scheme." RAIRO - Theoretical Informatics and Applications 53, no. 1-2 (January 2019): 67–84. http://dx.doi.org/10.1051/ita/2019001.
Full textChen, Min Qin, Qiao Yan Wen, Zheng Ping Jin, and Hua Zhang. "Secure and Efficient Certificateless Signature and Blind Signature Scheme from Pairings." Applied Mechanics and Materials 457-458 (October 2013): 1262–65. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1262.
Full textTu, Hang, Debiao He, and Baojun Huang. "Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/343715.
Full textDEHKORDI, MASSOUD HADIAN, and REZA ALIMORADI. "A NEW BATCH IDENTIFICATION SCHEME." Discrete Mathematics, Algorithms and Applications 01, no. 03 (September 2009): 369–76. http://dx.doi.org/10.1142/s1793830909000294.
Full textJames, Salome, N. B. Gayathri, and P. Vasudeva Reddy. "Pairing Free Identity-Based Blind Signature Scheme with Message Recovery." Cryptography 2, no. 4 (October 9, 2018): 29. http://dx.doi.org/10.3390/cryptography2040029.
Full textWei, Zhang. "A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings." International Journal of Technology and Human Interaction 12, no. 2 (April 2016): 72–82. http://dx.doi.org/10.4018/ijthi.2016040106.
Full textDu, Haorui, Jianhua Chen, Ming Chen, Cong Peng, and Debiao He. "A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing." Wireless Communications and Mobile Computing 2022 (October 19, 2022): 1–15. http://dx.doi.org/10.1155/2022/2336685.
Full textReddy, P. Vasudeva, A. Ramesh Babu, and N. B. Gayathri. "Pairing-based strong key-insulated signature scheme." International Journal of Information and Computer Security 18, no. 1/2 (2022): 148. http://dx.doi.org/10.1504/ijics.2022.122917.
Full textGayathri, N. B., P. Vasudeva Reddy, and A. Ramesh Babu. "Pairing-based strong key-insulated signature scheme." International Journal of Information and Computer Security 18, no. 1/2 (2022): 148. http://dx.doi.org/10.1504/ijics.2022.10047407.
Full textSharma, Neetu, and Birendra Kumar Sharma. "New Short Signature Scheme with Weil Pairing." International Journal of Computer Applications 94, no. 10 (May 16, 2014): 25–28. http://dx.doi.org/10.5120/16379-5883.
Full textWANG, Hui-ge. "Certificateless public key signature scheme without pairing." Journal of Computer Applications 28, no. 6 (August 20, 2008): 1395–97. http://dx.doi.org/10.3724/sp.j.1087.2008.01395.
Full textAbouelkheir, Eman, and Shamia El-sherbiny. "Pairing free identity based aggregate signcryption scheme." IET Information Security 14, no. 6 (November 1, 2020): 625–32. http://dx.doi.org/10.1049/iet-ifs.2019.0579.
Full textZheng, X. H., and D. G. Walmsley. "New pairing scheme to overhaul BCS theory." Solid State Communications 192 (August 2014): 56–59. http://dx.doi.org/10.1016/j.ssc.2014.04.016.
Full textTAKATSUKA, TATSUYUKI, and RYOZO TAMAGAKI. "ΛΣ− PAIRING IN “BUBBLE FERMI SHELL” SCHEME." Modern Physics Letters A 23, no. 27n30 (September 30, 2008): 2473–76. http://dx.doi.org/10.1142/s0217732308029617.
Full textYu, Huifang, and Bo Yang. "Pairing-Free and Secure Certificateless Signcryption Scheme." Computer Journal 60, no. 8 (February 9, 2017): 1187–96. http://dx.doi.org/10.1093/comjnl/bxx005.
Full textLim, Seongan, Eunjeong Lee, and Cheol-Min Park. "A short redactable signature scheme using pairing." Security and Communication Networks 5, no. 5 (July 13, 2011): 523–34. http://dx.doi.org/10.1002/sec.346.
Full textSun, Mei, Yuyan Guo, Dongbing Zhang, and MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks." Complexity 2021 (May 4, 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Full textQi, Huiwen, Yingsheng Peng, and Han Zhang. "Performance analysis for wireless-powered IoT networks with hybrid non-orthogonal multiple access." Journal of Smart Environments and Green Computing 2, no. 3 (2022): 105–25. http://dx.doi.org/10.20517/jsegc.2022.04.
Full textSenthil Kumar, T., and S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design." Measurement and Control 52, no. 7-8 (July 17, 2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Full textSong, Cheng, Mingyue Zhang, Zongpu Jia, Weiping Peng, and Hairu Guo. "A lightweight batch anonymous authentication scheme for VANET based on pairing-free." Computer Science and Information Systems 15, no. 3 (2018): 549–67. http://dx.doi.org/10.2298/csis171222022s.
Full textWu, Libing, Yubo Zhang, Kim-Kwang Raymond Choo, and Debiao He. "Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 647–64. http://dx.doi.org/10.1142/s0129054119400185.
Full textChia, Jason, Ji-Jian Chin, and Sook-Chin Yip. "A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures." Symmetry 13, no. 8 (July 23, 2021): 1330. http://dx.doi.org/10.3390/sym13081330.
Full textHan, Xu, Dawei Zhang, Zongmin Huang, Shuang Yao, and Zuodong Wu. "Revocable One-Time Ring Signature from Pairings." Wireless Communications and Mobile Computing 2022 (August 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/8021267.
Full textWahaballa, Abubaker. "Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme." Electronics 11, no. 21 (October 25, 2022): 3445. http://dx.doi.org/10.3390/electronics11213445.
Full textHu, Ziyuan, Shengli Liu, Kefei Chen, and Joseph Liu. "Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption." Cryptography 2, no. 4 (October 23, 2018): 33. http://dx.doi.org/10.3390/cryptography2040033.
Full textLUO, Li-xia, and Jun ZHANG. "Dynamic threshold signature scheme based on bilinear pairing." Journal of Computer Applications 30, no. 3 (April 2, 2010): 677–79. http://dx.doi.org/10.3724/sp.j.1087.2010.00677.
Full textM. Elkamchouchi, Hassan, Eman F. Abou Elkheir, and Yasmine Abouelseoud. "A Pairing-Free Identity Based Tripartite Signcryption Scheme." International Journal on Cryptography and Information Security 3, no. 4 (December 31, 2013): 1–9. http://dx.doi.org/10.5121/ijcis.2013.3401.
Full textChin, Ji-Jian, Syh-Yuan Tan, Swee-Huay Heng, Raphael C. W. Phan, and Rouzbeh Behnia. "A provable secure pairing-free certificateless identification scheme." International Journal of Computer Mathematics 92, no. 8 (October 3, 2014): 1520–35. http://dx.doi.org/10.1080/00207160.2014.957196.
Full textWang, L., L. Wang, and C. K. Wu. "Efficient identity-based multicast scheme from bilinear pairing." IEE Proceedings - Communications 152, no. 6 (2005): 877. http://dx.doi.org/10.1049/ip-com:20045308.
Full textYan, Xiaopeng, Zhiquan Bai, Ping Li, Peng Gong, and Jiantao Wang. "New certificateless public key encryption scheme without pairing." IET Information Security 7, no. 4 (December 1, 2013): 271–76. http://dx.doi.org/10.1049/iet-ifs.2012.0257.
Full textDehkordi, Massoud Hadian, and Reza Alimoradi. "Zero-knowledge identification scheme based on Weil pairing." Lobachevskii Journal of Mathematics 30, no. 3 (July 2009): 203–7. http://dx.doi.org/10.1134/s1995080209030020.
Full textHe, Debiao, Yitao Chen, and Jianhua Chen. "An efficient certificateless proxy signature scheme without pairing." Mathematical and Computer Modelling 57, no. 9-10 (May 2013): 2510–18. http://dx.doi.org/10.1016/j.mcm.2012.12.037.
Full text