Results 11 to 20 of about 222 (168)

Efficient and provably-secure certificateless sequential aggregate signature scheme

open access: yesTongxin xuebao, 2022
Aiming at the problem that current schemes mostly let the latter signer to verify the multiple signatures of the previous signer, and the message is signed and then passed to the next signer, leading to the efficiency problem of long overall signature ...
Zhu WANG   +5 more
doaj   +3 more sources

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

Insecurity of a Certificateless Aggregate Signature Scheme [PDF]

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2016
AbstractAs an important kind of digital signature, the aggregate signature could aggregate n signatures into a signature and verify those signatures simultaneously. It is suitable for the constrained environment with limited ability of computation and communication. Recently, Chen et al.
Han SHEN   +3 more
openaire   +2 more sources

Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian   +5 more
wiley   +1 more source

Design Principles of Secure Certificateless Signature and Aggregate Signature Schemes for IoT Environments

open access: yesIEEE Access, 2022
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj   +1 more source

Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]

open access: yesJisuanji gongcheng, 2023
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj   +1 more source

Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi   +21 more
wiley   +1 more source

Cryptanalysis of a certificateless aggregate signature scheme [PDF]

open access: yesSecurity and Communication Networks, 2016
AbstractAn aggregate signature refers to a signature, by which n signatures σ1,...,σn corresponding to n messages m1,...,mn and n users u1,...,un can be transformed into a single short signature . Besides, anyone can be convinced by the single short signature that the n messages m1,...,mn were definitely signed by the n users u1,...,un correspondingly.
Liangliang Wang   +3 more
openaire   +2 more sources

Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie   +5 more
wiley   +1 more source

A certificateless aggregate signature scheme for security and privacy protection in VANET

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy