Results 1 to 10 of about 3,702 (204)

Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]

open access: yesSensors
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei   +4 more
doaj   +2 more sources

Preserving Privacy of Internet of Things Network with Certificateless Ring Signature [PDF]

open access: yesSensors
With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks.
Yang Zhang   +4 more
doaj   +2 more sources

Certificateless

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397].
Ziba Eslami, Nasrollah Pakniat
doaj   +2 more sources

An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network [PDF]

open access: yesScientific Reports
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs).
Changyuan Luo   +2 more
doaj   +2 more sources

Certificateless Network Coding Scheme from Certificateless Public Auditing Protocol [PDF]

open access: yesThe Journal of Supercomputing, 2021
Abstract In recent years, network coding has received extensive attention and been applied to various computer network systems, since it has been mathematically proven to enhance the network robustness and maximize the network throughput. However, it is well-known that it is extremely vulnerable under pollution attacks.
Genqing Bian, Mingxuan Song, Bilin Shao
openaire   +1 more source

Forgery attacks on several certificateless signature schemes

open access: yes网络与信息安全学报, 2020
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine
WANG Jing, LI Zumeng
doaj   +3 more sources

Certificateless threshold signature from lattice

open access: yesDigital Communications and Networks
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory ...
Huifang Yu, Qi Zhang
doaj   +2 more sources

CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud

open access: yesApplied Sciences, 2022
In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one’s own preferred order.
Chengdong Ren   +4 more
doaj   +1 more source

Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model

open access: yesIEEE Access, 2023
Signature can be used to verify the integrity of both a message and the identity of a signer, whereas encryption can be used to ensure the confidentiality of a message.
Tung-Tso Tsai   +2 more
doaj   +1 more source

Certificateless signcryption [PDF]

open access: yesProceedings of the 2008 ACM symposium on Information, computer and communications security, 2008
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and ...
Barbosa, Manuel B M, Farshim, Pooya
openaire   +2 more sources

Home - About - Disclaimer - Privacy