Results 141 to 150 of about 437 (175)
Some of the next articles are maybe not open access.
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography
International Journal of Computer Mathematics, 2015In a digital multisignature scheme, two or more signers are allowed to produce a single signature on a common message, which can be verified by anyone. In the literature, many schemes are available based on the public key infrastructure or identity-based cryptosystem with bilinear pairing and map-to-point MTP hash function. The bilinear pairing and the
SK Hafizul Islam +4 more
openaire +1 more source
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks
2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017Assured Mission Delivery Network (AMDN) is a collaborative network to support data-intensive scientific collaborations in a multi-cloud environment. Each scientific collaboration group, called a mission, specifies a set of rules to handle computing and network resources.
Jongho Won, Ankush Singla, Elisa Bertino
openaire +1 more source
An efficient certificateless public key cryptography with authorized equality test in IIoT
Journal of Ambient Intelligence and Humanized Computing, 2019Current time organizations have moved from the conventional industries to smart industries by embracing the approach of Industrial Internet of Things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies.
Rashad Elhabob +3 more
openaire +1 more source
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography
2005This paper presents the first mediated certificateless public key encryption and signature schemes. We also extend our schemes into hierarchical schemes. Our schemes does not suffer from the key escrow property that seems to be inherent in the mediated identity-based schemes.
Hak Soo Ju +4 more
openaire +1 more source
TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet
2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009Identity-Based Cryptography (IBC) offers the very interesting property that the user's public key is related directly to her/his identity. However, IBC suffers from key escrow because the user private key is generated by an external entity called the Private Key Generator (PKG).
Ahmad Ahmad +3 more
openaire +1 more source
2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire +1 more source
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire +1 more source
Research on Certificateless Public Key Cryptography
Journal of Software, 2011Fu-Tai ZHANG +4 more
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Advanced cryptography technique in certificateless environment using SDBAES
International Journal of Advanced Intelligence Paradigms, 2018C.G. Naveen Kumar, C. Chandrasekar
openaire +1 more source

