Results 11 to 20 of about 685 (192)

Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]

open access: yesJisuanji gongcheng
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj   +3 more sources

Certificateless Short Aggregate Signature Scheme for Mobile Devices [PDF]

open access: yesIEEE Access, 2019
Today, data is exploding. A large amount of data needs to be processed in a timely and an efficient manner. Aggregate signatures are an efficient and secure way to handle large numbers of digital signatures. In an aggregate signature scheme, n signatures
Lunzhi Deng, Yixian Yang, Yuling Chen
doaj   +2 more sources

ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments [PDF]

open access: yesEntropy
As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism.
Cong Wang   +4 more
doaj   +2 more sources

A Security-Enhanced Certificateless Aggregate Authentication Protocol with Revocation for Wireless Medical Sensor Networks [PDF]

open access: yesSensors
Wireless medical sensor networks (WMSNs) enable continuous patient monitoring by transmitting sensitive physiological data over open wireless links.
Quan Fan, Yimin Wang, Xiang Li
doaj   +2 more sources

Practical Certificateless Aggregate Signatures From Bilinear Maps [PDF]

open access: yes, 2008
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage ...
Chen, Kefei   +3 more
core   +6 more sources

LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT [PDF]

open access: yesEntropy
Aiming at the challenge that traditional signature schemes struggle to simultaneously achieve efficiency, resistance to quantum attacks, and privacy protection, this paper proposes a lattice-based conditional privacy-preserving certificateless aggregate ...
Lin Shi   +4 more
doaj   +2 more sources

On the security of a certificateless aggregate signature scheme [PDF]

open access: yesInternational Journal of Advancements in Computing Technology, 2013
Aggregate signature can combinensignatures on nmessages fromnusers into a single short signature, and the resulting signature can convince the verifier that thenusers indeed signed the ncorresponding messages.
Hua Zhang   +4 more
core   +3 more sources

Certificateless Aggregate Signatures: A Comprehensive Survey and Comparative Analysis [PDF]

open access: yesJournal of Universal Computer Science
This paper presents a comprehensive survey of the certificateless aggregate signature scheme in terms of their computational performance and security. This signature scheme is of significant interest because of its relevance in various domains such as ...
Rupesh Kumar Verma   +3 more
doaj   +4 more sources

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

Insecurity of a Certificateless Aggregate Signature Scheme [PDF]

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2016
AbstractAs an important kind of digital signature, the aggregate signature could aggregate n signatures into a signature and verify those signatures simultaneously. It is suitable for the constrained environment with limited ability of computation and communication. Recently, Chen et al.
Han SHEN   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy