Results 131 to 140 of about 437 (175)
Some of the next articles are maybe not open access.

An efficient certificateless cryptography scheme without pairing

Proceedings of the third ACM conference on Data and application security and privacy, 2013
We propose a mediated certificateless encryption scheme without pairing operations. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography.
Seo, Seung-Hyun   +3 more
openaire   +2 more sources

On the Relation among Various Security Models for Certificateless Cryptography

Coding and Cryptology, 2008
Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models.
Qiong Huang, Duncan S. Wong
openaire   +1 more source

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security

Information Sciences, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Lei   +4 more
openaire   +2 more sources

A modest approach on MANET using certificateless cryptography

2017 International Conference on Intelligent Sustainable Systems (ICISS), 2017
A MANET is an independent collection of mobile devices that communicate with each other. The use a wireless links and work together in a distributed manner. This network, the Security is the most important attention because of its lack of centralized devices. In mobile ad hoc networks, the load and complication for key management is intensely dependent
R. Rajesh, M. Ramakrishnan, B. Sugumar
openaire   +1 more source

Two-party authenticated key agreement in certificateless public key cryptography

Wuhan University Journal of Natural Sciences, 2007
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed.
Yijuan Shi, Jianhua Li
openaire   +1 more source

Efficient three-party authenticated key agreement protocol in certificateless cryptography

International Journal of Computer Mathematics, 2011
Key agreement protocols are multi-party protocols in which entities exchange public information allowing them to create a common secret key that is known only to those entities and which cannot be predetermined by any party. Key agreement can be achieved using a public key infrastructure or identity-based cryptography.
Hu Xiong, Zhong Chen, Zhiguang Qin
openaire   +1 more source

A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography

2010 International Conference of Information Science and Management Engineering, 2010
Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson at Asiacrypt 2003.
Huaqun Wang, Shengju Han
openaire   +1 more source

Certificateless Cryptography with KGC Trust Level 3 Revisited

2017
This paper revisits the issue of obtaining KGC (Key Generator Center) trust level 3 in certificateless cryptography. The AP (Al-Riyami-Paterson) binding technique can modularly construct the certificateless encryption/signature scheme with trust level 3 from that with trust level 2. However, its security proof has been an open problem.
Fei Li   +3 more
openaire   +1 more source

A Method for Fast Revocation of Certificateless Public Key Cryptography

2006 International Conference on Computer Engineering and Systems, 2006
"Certificateless Public Key Cryptography" has very appealing features, namely it does not require any public key certification (traditional Public Key Cryptography) nor having key escrow problem (Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity ...
Ibrahim Ibrahim   +2 more
openaire   +1 more source

Key management scheme based on certificateless cryptography for satellite networks

2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012
The article proposes a key management scheme for satellite networks targeting the problem of existing key management scheme cannot be suitable for satellite networks. Threshold secret mechanism is used to achieve the protection for system master key, and avoid the single point of failure problem.
Yu Zhefu, Zhou Haigang, Wu Zhaofeng
openaire   +1 more source

Home - About - Disclaimer - Privacy