Results 21 to 30 of about 10,337 (237)

A concrete certificateless signature scheme without pairings [PDF]

open access: yes, 2009
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core   +2 more sources

Efficient identity-based authenticated multiple key exchange protocol - doi: 10.4025/actascitechnol.v35i4.16434

open access: yesActa Scientiarum: Technology, 2013
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party.
Yitao Chen, Weiwei Han
doaj   +1 more source

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings

open access: yesIEEE Access, 2021
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj   +1 more source

Expanders and right-angled Artin groups

open access: yes, 2021
The purpose of this article is to give a characterization of families of expander graphs via right-angled Artin groups. We prove that a sequence of simplicial graphs $\{\Gamma_i\}_{i\in\mathbb{N}}$ forms a family of expander graphs if and only if a ...
Flores, Ramón   +2 more
core   +1 more source

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

open access: yesJournal of Applied Mathematics, 2014
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj   +1 more source

Limited Verifier Signature from Bilinear Pairings [PDF]

open access: yes, 2004
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a limited verifier, who will try to preserve the privacy of the signer if the signer follows some specified rules. Also, the limited verifier can provide a proof to convince a
Chen, XF Chen, Xiaofeng   +2 more
openaire   +1 more source

Balanced algebraic unknotting, linking forms, and surfaces in three- and four-space

open access: yes, 2020
We provide three 3-dimensional characterizations of the Z-slice genus of a knot, the minimum genus of a locally-flat surface in 4-space cobounding the knot whose complement has cyclic fundamental group: in terms of balanced algebraic unknotting, in terms
Feller, Peter, Lewark, Lukas
core   +1 more source

Certificateless strong designated verifier multi-signature

open access: yesTongxin xuebao, 2016
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

Integral operators and integral cohomology classes of Hilbert schemes [PDF]

open access: yes, 2004
The methods of integral operators on the cohomology of Hilbert schemes of points on surfaces are developed. They are used to establish integral bases for the cohomology groups of Hilbert schemes of points on a class of surfaces (and conjecturally, for ...
Qin, Zhenbo, Wang, Weiqiang
core   +1 more source

A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue.
Hongzhen Du, QiaoYan Wen, Shanshan Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy