Search
Search Results
-
DIDOR: A Decentralized Identifier Based Onion Routing Protocol
We propose a new communication protocol, called DIDOR, that provides strong anonymity and is based on a decentralized identifier (DID). The proposed... -
Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security
Harn has introduced a (t, n) threshold secret sharing scheme recently, in which shareholders’ shares are not disclosed in the secret reconstruction... -
Unconditionally secure short key ciphers based on data compression and randomization
We consider the problem of constructing an unconditionally secure cipher for the case when the key length is less than the length of the encrypted...
-
Two High-Performance Antenna Selection Schemes for Secure SSK Modulation in Intelligent Industrial Wireless Sensing Systems
Industrial wireless sensor networks (IWSNs) provide intelligent factory management with a new dimension. Reliable intelligent industrial wireless... -
From Centralized to Decentralized Remote Electronic Voting
Elections generally involve the simple tasks of counting votes and publishing the final tally to voters. Depending on the election’s scope, these... -
Anonymity and everlasting privacy in electronic voting
Everlasting privacy protects cryptographic voting systems against the weakening of intractability assumptions on which they may be based. We find...
-
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device...
-
Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
We study the communication complexity of unconditionally secure multiparty computation (MPC) protocols in the honest majority setting. Despite... -
Quantum Key Distribution: An Ascendable Mechanism for Cryptographic Key Distribution
Quantum key distribution (QKD) is a mechanism that works on quantum mechanics principles, which allows communicating users to protect their key... -
Dynamic Local Searchable Symmetric Encryption
In this article, we tackle for the first time the problem of dynamic memory-efficient Searchable Symmetric Encryption (SSE). In the term... -
A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions
Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....
-
Quantum Key Distribution in Internet of Things
This chapter aims to explore the integration of Quantum Key Distribution (QKD) with IoT systems. It delves into the potential benefits, challenges,... -
MLS Group Messaging: How Zero-Knowledge Can Secure Updates
The Messaging Layer Security (MLS) protocol currently developed by the Internet Engineering Task Force (IETF) aims at providing a secure group... -
Fundamentals of Quantum Key Distribution
Establishing secure cryptographic keys through an untrusted network is a fundamental cryptographic task. While the use of public key infrastructure... -
Intellectual property protection mechanisms and the characteristics of founding teams
Intellectual property protection mechanisms (IPPMs) are critical to fostering science, technology, and innovation, and their relevance has grown...
-
From Point-to-Point to End-to-End Security in Quantum Key Distribution Networks
Because quantum key distribution is a technology for establishing keys for symmetric encryption (preferably one-time pads, but more practically keys... -
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation
A wiretap coding scheme (Wyner in Bell Syst Tech J 54(8):1355–1387, 1975) enables Alice to reliably communicate a message m to an honest Bob by...
-
Intelligent Reflecting Surface-Aided Physical-Layer Security Communications
The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdrop** and even malicious... -
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product...
-
Mosaics of combinatorial designs for information-theoretic security
We study security functions which can serve to establish semantic security for the two central problems of information-theoretic security: the...