Results 131 to 140 of about 437 (175)
Some of the next articles are maybe not open access.
An efficient certificateless cryptography scheme without pairing
Proceedings of the third ACM conference on Data and application security and privacy, 2013We propose a mediated certificateless encryption scheme without pairing operations. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography.
Seo, Seung-Hyun +3 more
openaire +2 more sources
On the Relation among Various Security Models for Certificateless Cryptography
Coding and Cryptology, 2008Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models.
Qiong Huang, Duncan S. Wong
openaire +1 more source
Information Sciences, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Lei +4 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Lei +4 more
openaire +2 more sources
A modest approach on MANET using certificateless cryptography
2017 International Conference on Intelligent Sustainable Systems (ICISS), 2017A MANET is an independent collection of mobile devices that communicate with each other. The use a wireless links and work together in a distributed manner. This network, the Security is the most important attention because of its lack of centralized devices. In mobile ad hoc networks, the load and complication for key management is intensely dependent
R. Rajesh, M. Ramakrishnan, B. Sugumar
openaire +1 more source
Two-party authenticated key agreement in certificateless public key cryptography
Wuhan University Journal of Natural Sciences, 2007Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed.
Yijuan Shi, Jianhua Li
openaire +1 more source
Efficient three-party authenticated key agreement protocol in certificateless cryptography
International Journal of Computer Mathematics, 2011Key agreement protocols are multi-party protocols in which entities exchange public information allowing them to create a common secret key that is known only to those entities and which cannot be predetermined by any party. Key agreement can be achieved using a public key infrastructure or identity-based cryptography.
Hu Xiong, Zhong Chen, Zhiguang Qin
openaire +1 more source
A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography
2010 International Conference of Information Science and Management Engineering, 2010Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson at Asiacrypt 2003.
Huaqun Wang, Shengju Han
openaire +1 more source
Certificateless Cryptography with KGC Trust Level 3 Revisited
2017This paper revisits the issue of obtaining KGC (Key Generator Center) trust level 3 in certificateless cryptography. The AP (Al-Riyami-Paterson) binding technique can modularly construct the certificateless encryption/signature scheme with trust level 3 from that with trust level 2. However, its security proof has been an open problem.
Fei Li +3 more
openaire +1 more source
A Method for Fast Revocation of Certificateless Public Key Cryptography
2006 International Conference on Computer Engineering and Systems, 2006"Certificateless Public Key Cryptography" has very appealing features, namely it does not require any public key certification (traditional Public Key Cryptography) nor having key escrow problem (Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity ...
Ibrahim Ibrahim +2 more
openaire +1 more source
Key management scheme based on certificateless cryptography for satellite networks
2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012The article proposes a key management scheme for satellite networks targeting the problem of existing key management scheme cannot be suitable for satellite networks. Threshold secret mechanism is used to achieve the protection for system master key, and avoid the single point of failure problem.
Yu Zhefu, Zhou Haigang, Wu Zhaofeng
openaire +1 more source

