Results 11 to 20 of about 632 (158)

Certificateless

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397].
Ziba Eslami, Nasrollah Pakniat
doaj   +2 more sources

Certificateless Network Coding Scheme from Certificateless Public Auditing Protocol [PDF]

open access: yesThe Journal of Supercomputing, 2021
Abstract In recent years, network coding has received extensive attention and been applied to various computer network systems, since it has been mathematically proven to enhance the network robustness and maximize the network throughput. However, it is well-known that it is extremely vulnerable under pollution attacks.
Genqing Bian, Mingxuan Song, Bilin Shao
openaire   +1 more source

Certificateless threshold signature from lattice

open access: yesDigital Communications and Networks
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory ...
Huifang Yu, Qi Zhang
doaj   +2 more sources

Certificateless signcryption [PDF]

open access: yesProceedings of the 2008 ACM symposium on Information, computer and communications security, 2008
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and ...
Barbosa, Manuel B M, Farshim, Pooya
openaire   +2 more sources

Certificateless hybrid signcryption [PDF]

open access: yesMathematical and Computer Modelling, 2009
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in the ...
Li, Fagen   +2 more
openaire   +1 more source

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

open access: yesIEEE Access, 2023
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu   +3 more
doaj   +1 more source

Certificateless Proxy Signature from RSA [PDF]

open access: yesMathematical Problems in Engineering, 2014
Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.
Deng, Lunzhi, Zeng, Jiwen, Qu, Yunyun
openaire   +3 more sources

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

open access: yesIEEE Access, 2020
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj   +1 more source

Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations

open access: yesThe Scientific World Journal, 2014
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj   +1 more source

Home - About - Disclaimer - Privacy