Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei +4 more
doaj +2 more sources
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature [PDF]
With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks.
Yang Zhang +4 more
doaj +2 more sources
An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network [PDF]
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs).
Changyuan Luo +2 more
doaj +2 more sources
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj +1 more source
Forgery attacks on several certificateless signature schemes
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine
WANG Jing, LI Zumeng
doaj +3 more sources
CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud
In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one’s own preferred order.
Chengdong Ren +4 more
doaj +1 more source
Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
Signature can be used to verify the integrity of both a message and the identity of a signer, whereas encryption can be used to ensure the confidentiality of a message.
Tung-Tso Tsai +2 more
doaj +1 more source
Certificateless Searchable Encryption Scheme in Multi-User Environment
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj +1 more source
A Lattice-Based Certificateless Traceable Ring Signature Scheme
A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring ...
Junbin Liang +4 more
doaj +1 more source
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source

