Results 51 to 60 of about 685 (192)

Cryptanalysis and Improvement of Three Certificateless Aggregate Signature Schemes [PDF]

open access: yesMathematical Problems in Engineering, 2018
The certificateless aggregate signature (CLAS) scheme is a very important data aggregation technique that compresses a large number of signatures from different users into a short signature. CLAS can reduce the total length of a signature and the computational overhead of signature verification and is therefore highly suitable for resource-constrained ...
Xiaodong Yang   +4 more
openaire   +1 more source

Redactable Blockchain-Assisted Secure Data Aggregation Scheme for Fog-Enabled Internet-of-Farming-Things [PDF]

open access: yes, 2023
Internet-of-Farming Things (IoFT)-enabled smart agriculture can collect data more reliably and frequently to track the crop’s status and other significant information.
Bellavista, Paolo   +3 more
core   +1 more source

Cryptanalysis of an online/offline certificateless signature scheme for Internet of Health Things [PDF]

open access: yes, 2021
Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal of Healthcare Engineering, vol. 2020] presented a new certificateless offline/online signature scheme for Internet of Health Things (IoHT ...
Hussain, S.   +4 more
core  

Efficient Digital Signature Scheme for Internet of Things [PDF]

open access: yes, 2021
Apparently enthusiasm for the Internet of things (IoT) has as of late arrived at its top, with a lot of center from both the private and public parts.
et al., V. Muthukumaran
core   +1 more source

Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”

open access: yesIEEE Access
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj   +1 more source

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure [PDF]

open access: yes, 2020
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resources ...
Alazab, Mamoun   +7 more
core   +3 more sources

Cryptanalysis of Compact Certificateless Aggregate Signature Schemes for HWMSNs and VANETs

open access: yesIEEE Access
Certificateless cryptosystems resolve the critical problems in public-key cryptosystems and identity-based cryptosystems. A certificateless aggregate signature scheme aggregates multiple signatures of multiple signers into a single signature that ...
Kyung-Ah Shim
doaj   +1 more source

LIMA: Local and Lightweight Mutual Authentication for VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi   +2 more
wiley   +1 more source

Provably secure certificateless aggregate signature scheme in wireless roaming authentication

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU   +3 more
doaj   +2 more sources

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy