Results 1 to 10 of about 3,702 (204)
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei +4 more
doaj +2 more sources
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature [PDF]
With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks.
Yang Zhang +4 more
doaj +2 more sources
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397].
Ziba Eslami, Nasrollah Pakniat
doaj +2 more sources
An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network [PDF]
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs).
Changyuan Luo +2 more
doaj +2 more sources
Certificateless Network Coding Scheme from Certificateless Public Auditing Protocol [PDF]
Abstract In recent years, network coding has received extensive attention and been applied to various computer network systems, since it has been mathematically proven to enhance the network robustness and maximize the network throughput. However, it is well-known that it is extremely vulnerable under pollution attacks.
Genqing Bian, Mingxuan Song, Bilin Shao
openaire +1 more source
Forgery attacks on several certificateless signature schemes
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine
WANG Jing, LI Zumeng
doaj +3 more sources
Certificateless threshold signature from lattice
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory ...
Huifang Yu, Qi Zhang
doaj +2 more sources
CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud
In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one’s own preferred order.
Chengdong Ren +4 more
doaj +1 more source
Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
Signature can be used to verify the integrity of both a message and the identity of a signer, whereas encryption can be used to ensure the confidentiality of a message.
Tung-Tso Tsai +2 more
doaj +1 more source
Certificateless signcryption [PDF]
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and ...
Barbosa, Manuel B M, Farshim, Pooya
openaire +2 more sources

