Results 31 to 40 of about 632 (158)

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles

open access: yesIEEE Access, 2019
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob   +3 more
doaj   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

open access: yesSensors, 2018
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme.
Congcong Li   +3 more
doaj   +1 more source

Certificateless Public Key Cryptography [PDF]

open access: yes, 2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an
Sattam S. Al-Riyami, Kenneth G. Paterson
openaire   +1 more source

Cryptanalysis of Keyword Confidentiality in a Searchable Public‐Key Encryption Scheme Against Malicious Server

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Public‐key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword‐guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated‐server PAEKS (dPAEKS) scheme was proposed to withstand KGAs.
Nan Zhang   +3 more
wiley   +1 more source

Provably secure certificateless aggregate signature scheme in wireless roaming authentication

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU   +3 more
doaj   +2 more sources

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang   +5 more
wiley   +1 more source

A provably security and efficient certificateless short signature scheme [PDF]

open access: yesJisuanji gongcheng, 2019
In the certificateless cryptography system,there is no authentication relationship between the public key and the holder,which may cause a problem that a malicious user replaces the user’s public key.To This end,this paper improves the definition of ...
ZUO Liming,ZHOU Qing,CHEN Lanlan
doaj   +1 more source

Home - About - Disclaimer - Privacy