A survey on cross-chain technology: Challenges, development, and prospect

H Mao, T Nie, H Sun, D Shen, G Yu - Ieee Access, 2022 - ieeexplore.ieee.org
With the continuous development of blockchain technology, many blockchain applications,
such as digital currencies in the form of tokens, are deployed. However, due to the lack of …

Secured information sharing in supply chain management: Modified data sanitization with optimal key generation via hybrid algorithm

D Kalyani, P Srivani, S Pradeep - Advances in Engineering Software, 2022 - Elsevier
In the majority of commercial scenarios, supply chain management (SCM) is turning out to
be a fundamental focus area. In SCM, a hopeful solution for secured information sharing (IS) …

Accountable identity-based encryption with distributed private key generators

Z Zhao, G Wu, W Susilo, F Guo, B Wang, Y Hu - Information Sciences, 2019 - Elsevier
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable
approach to mitigate the inherent key escrow problem, where the user's private key is …

Particle swarm based optimal key generation: block chain assisted secure information sharing in supply chain management

D Kalyani, P Vijay Kumar - … , ICAICR 2020, Gurugram, India, December 26 …, 2021 - Springer
The supply chain is essentially a network of businesses and people, who are involved in
manufacturing or delivering products and services. As businesses have enlarged, the supply …

[PDF][PDF] New Hierarchical Identity Based Encryption with maximum hierarchy.

D Kalyani, R Sridevi - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
Abstract Identity Based Encryption (IBE) is a type of public-key encryption in which the public
key of a user has some unique information about the identity of the user, and it is an …

Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography

Q Feng, D He, H Wang, D Wang… - IET Information …, 2020 - Wiley Online Library
Identity‐based cryptography (IBC) is considered as a promising mechanism in the Internet of
Things and ad‐hoc networks, providing lightweight authentication and powerful access …

Private Communication Based on Hierarchical Identity-Based Cryptography

D Kalyani, R Sridevi - Emerging Technologies in Data Mining and …, 2019 - Springer
Abstract Public Key Infrastructure (PKI) is an important tool for securing information in the
communication. Presently, a PKI framework demonstrates a pattern toward an emerging …

An Efficient Symmetric Key-Based Lightweight Fully Homomorphic Encryption Scheme

V Biksham, D Vasumathi - … of the Third International Conference on …, 2020 - Springer
Maintaining the secrecy and privacy of data, generally in cloud scenario, has become an
intense challenge for the present day's practical applications. However, transferring private …

STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY'S SECURE WORLD.

D Kalyani, P Vijay - International Journal of Advanced …, 2017 - search.ebscohost.com
Nowadays every communication and data exchange has been digitized. So everyone thinks
about privacy and security. In this paper, we are highlighting the need for security in daily …