Results 71 to 80 of about 632 (158)

Certificateless-based efficient aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2015
The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the ...
Yu-lei ZHANG   +4 more
doaj   +2 more sources

Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks

open access: yesDianxin kexue
To address the issue of message confidentiality in certificateless signature schemes and the shortcomings of most signcryption schemes, such as incomplete security functions and low efficiency, a certificateless aggregate signcryption scheme based on ...
LIU Jie, FAN Xinyue, HE Jiahui
doaj  

Cryptanalysis of Compact Certificateless Aggregate Signature Schemes for HWMSNs and VANETs

open access: yesIEEE Access
Certificateless cryptosystems resolve the critical problems in public-key cryptosystems and identity-based cryptosystems. A certificateless aggregate signature scheme aggregates multiple signatures of multiple signers into a single signature that ...
Kyung-Ah Shim
doaj   +1 more source

Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”

open access: yesIEEE Access
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj   +1 more source

Fuzzy certificateless signature

open access: yesSecurity and Communication Networks, 2016
Liangliang Wang   +4 more
openaire   +1 more source

New certificateless aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key ...
Zhi-yan XU   +3 more
doaj  

Home - About - Disclaimer - Privacy