A survey on secure communication techniques for 5G wireless heterogeneous networks
A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …
security protocols and techniques are never ending. With the enlargement of 5G paradigm …
Securing an authenticated privacy preserving protocol in a group signature scheme based on a group ring
Group signatures are a leading competing signature technique with a substantial amount of
research. With group settings, group signatures provide user anonymity. Any group member …
research. With group settings, group signatures provide user anonymity. Any group member …
A quantum secure ID-based cryptographic encryption based on group rings
Abstract Identity-based (ID-based) encryption is a very important cryptographic primitive. It is
advantageous over the conventional public key cryptosystems due to direct and easy …
advantageous over the conventional public key cryptosystems due to direct and easy …
Group ring based public key cryptosystems
In this paper, we propose two cryptosystems based on group rings and existing
cryptosystem. First one is Elliptic ElGamal type group ring public key cryptosystem whose …
cryptosystem. First one is Elliptic ElGamal type group ring public key cryptosystem whose …
Novel public-key cryptosystems based on NTRU and algebraic structure of group rings
In this paper, we propose two novel public-key cryptosystems by combining the well-known
NTRU public-key cryptosystem with the algebraic structure of group rings. We discuss the …
NTRU public-key cryptosystem with the algebraic structure of group rings. We discuss the …
Lightweight noncommutative key exchange protocol for IoT environments
Network communications are expanding rapidly in many fields, including
telecommunications, the Internet of Things, space, consumer electronics, and the military …
telecommunications, the Internet of Things, space, consumer electronics, and the military …
QEdu: A Quantum-Safe Blockchain Framework to Secure and Verify Educational Credentials
ATM Shifat, MA Habib, S Hasan… - 2023 26th International …, 2023 - ieeexplore.ieee.org
Distributed Ledger Technologies (DLT), notably blockchain, have advanced significantly,
finding applications in various domains, including education, for enhanced transparency …
finding applications in various domains, including education, for enhanced transparency …
Digital signature schemes based on group ring
In this paper, we propose three digital signature schemes based on the algebraic structure
of group ring. The first scheme is a deterministic signature scheme, the second scheme is a …
of group ring. The first scheme is a deterministic signature scheme, the second scheme is a …
An efficient ElGamal cryptosystem scheme
HI Hussein, WM Abduallah - International Journal of Computers …, 2021 - Taylor & Francis
ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs
for the same input, making the cryptosystem more secure. On the other hand, the efficiency …
for the same input, making the cryptosystem more secure. On the other hand, the efficiency …
A novel and efficient undeniable signature scheme based on group ring
G Mittal, S Kumar, S Kumar, S Mittal - Soft Computing, 2024 - Springer
The concept of undeniable signature scheme was proposed by Chaum and Antwerpen in
1989. In this scheme, the signature can only be verified by the verifier with the co-operation …
1989. In this scheme, the signature can only be verified by the verifier with the co-operation …