A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

A quantum secure ID-based cryptographic encryption based on group rings

G Mittal, S Kumar, S Kumar - Sādhanā, 2022 - Springer
Abstract Identity-based (ID-based) encryption is a very important cryptographic primitive. It is
advantageous over the conventional public key cryptosystems due to direct and easy …

Securing an Authenticated Privacy Preserving Protocol in a Group Signature Scheme Based on a Group Ring

NAS Amir, WAM Othman, KB Wong - Mathematics, 2023 - mdpi.com
Group signatures are a leading competing signature technique with a substantial amount of
research. With group settings, group signatures provide user anonymity. Any group member …

Group ring based public key cryptosystems

G Mittal, S Kumar, S Narain, S Kumar - Journal of discrete …, 2022 - Taylor & Francis
In this paper, we propose two cryptosystems based on group rings and existing
cryptosystem. First one is Elliptic ElGamal type group ring public key cryptosystem whose …

Digital signature schemes based on group ring

S Kumar, G Mittal, S Kumar - SN Computer Science, 2022 - Springer
In this paper, we propose three digital signature schemes based on the algebraic structure
of group ring. The first scheme is a deterministic signature scheme, the second scheme is a …

Novel public-key cryptosystems based on NTRU and algebraic structure of group rings

G Mittal, S Kumar, S Kumar - Journal of Information and …, 2021 - Taylor & Francis
In this paper, we propose two novel public-key cryptosystems by combining the well-known
NTRU public-key cryptosystem with the algebraic structure of group rings. We discuss the …

An efficient ElGamal cryptosystem scheme

HI Hussein, WM Abduallah - International Journal of Computers …, 2021 - Taylor & Francis
ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs
for the same input, making the cryptosystem more secure. On the other hand, the efficiency …

Pell hyperbolas in DLP–based cryptosystems

G Alecci, S Dutto, N Murru - Finite Fields and Their Applications, 2022 - Elsevier
We present a study on the use of Pell hyperbolas in cryptosystems with security based on
the discrete logarithm problem. Specifically, after introducing the group structure over …

Improved cryptanalysis of a ElGamal cryptosystem based on matrices over group rings

A Pandey, I Gupta, D Kumar Singh - Journal of Mathematical …, 2020 - degruyter.com
ElGamal cryptosystem has emerged as one of the most important construction in Public Key
Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However …

QEdu: A Quantum-Safe Blockchain Framework to Secure and Verify Educational Credentials

ATM Shifat, MA Habib, S Hasan… - 2023 26th International …, 2023 - ieeexplore.ieee.org
Distributed Ledger Technologies (DLT), notably blockchain, have advanced significantly,
finding applications in various domains, including education, for enhanced transparency …