FAIDM for medical privacy protection in 5G telemedicine systems

TW Lin, CL Hsu - Applied Sciences, 2021 - mdpi.com
Featured Application This work can be applied in 5G telemedicine systems which can
remote monitor health condition of patients and provide medical related data to medical …

On chaos in the fractional-order discrete-time macroeconomic systems

RB Albadarneh, A Abbes, A Ouannas… - AIP Conference …, 2023 - pubs.aip.org
This work proposes a new fractional-order form of a Discrete-time macroeconomic system
based on the Caputo–like difference operator. The dynamics of the proposed system are …

Secure identity-based blind signature scheme for online transactions

L Deng, X He, T Xia - Wireless Personal Communications, 2021 - Springer
Today, more and more business activities are done through online transactions. How to
protect the personal privacy of customers in online transactions has become an urgent …

Security Analysis and Improvement of Proxy Signature Scheme with Certificateless and Blind Properties

X Hu - 2023 2nd International Conference on Big Data …, 2023 - ieeexplore.ieee.org
Proxy signature scheme with certificateless and blind properties is called certificateless
proxy blind signature (CT-PBS) scheme which holds many security properties such as …

A Survey on Identity-Based Blind Signature

M Koscina, P Lafourcade, G Marcadet… - … on Foundations and …, 2022 - Springer
Blind signatures are well-studied building blocks of cryptography, originally designed to
enable anonymity in electronic voting and digital banking. Identity-based signature were …

[PDF][PDF] Development of a New Chaotic Maps Cryptosystem with Quadratic Residue Problem.

N Tahat, R Shaqbou'a, M Abu-Dalu… - International Journal of …, 2022 - researchgate.net
A new fast public key cryptosystem is proposed, which is based on two dissimilar number-
theoretic hard problems, namely the simultaneous chaotic maps (CM) problem and …

Comment on security and improvement of partial blind signature scheme and revocable certificateless signature scheme

X Hu, F Chen, C Ma, W Tan - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Partial blind signature scheme (BLD-SS) can protect the specific content of the signed
message by adding factor to blind the signed message and can also prevent the misuse of …

A Survey on Identity-Based Blind Signature

MCK Olivier-Anclin, P Lafourcade - Foundations and Practice of …, 2023 - books.google.com
Blind signatures are well-studied building blocks of cryptography, originally designed to
enable anonymity in electronic voting and digital banking. Identity-based signature were …

A New Authentication Scheme Based on Chaotic Maps and Factoring Problems Check for updates

N Tahat, OM Al-hazaimeh… - … and Computation: IACMC …, 2023 - books.google.com
Users of public key cryptography systems reveal their public keys, but they keep their private
keys private. A public key directory is where all of your public keys are kept. Public key …

Quantum Voting Protocol Based on Blind Signature

Q Yuwei, C Sihao, L Na, B Qian - The International Conference on Natural …, 2022 - Springer
Aiming at the problem of high technical difficulty in the implementation of quantum voting
protocol, a quantum voting protocol based on blind signature is proposed, which avoids the …