Results 11 to 20 of about 222 (168)
Efficient and provably-secure certificateless sequential aggregate signature scheme
Aiming at the problem that current schemes mostly let the latter signer to verify the multiple signatures of the previous signer, and the message is signed and then passed to the next signer, leading to the efficiency problem of long overall signature ...
Zhu WANG +5 more
doaj +3 more sources
A New Certificateless Aggregate Signature Scheme [PDF]
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj +1 more source
Insecurity of a Certificateless Aggregate Signature Scheme [PDF]
AbstractAs an important kind of digital signature, the aggregate signature could aggregate n signatures into a signature and verify those signatures simultaneously. It is suitable for the constrained environment with limited ability of computation and communication. Recently, Chen et al.
Han SHEN +3 more
openaire +2 more sources
Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian +5 more
wiley +1 more source
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj +1 more source
Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj +1 more source
Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi +21 more
wiley +1 more source
Cryptanalysis of a certificateless aggregate signature scheme [PDF]
AbstractAn aggregate signature refers to a signature, by which n signatures σ1,...,σn corresponding to n messages m1,...,mn and n users u1,...,un can be transformed into a single short signature . Besides, anyone can be convinced by the single short signature that the n messages m1,...,mn were definitely signed by the n users u1,...,un correspondingly.
Liangliang Wang +3 more
openaire +2 more sources
Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie +5 more
wiley +1 more source
A certificateless aggregate signature scheme for security and privacy protection in VANET
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi +3 more
doaj +1 more source

