Results 141 to 150 of about 437 (175)
Some of the next articles are maybe not open access.

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography

International Journal of Computer Mathematics, 2015
In a digital multisignature scheme, two or more signers are allowed to produce a single signature on a common message, which can be verified by anyone. In the literature, many schemes are available based on the public key infrastructure or identity-based cryptosystem with bilinear pairing and map-to-point MTP hash function. The bilinear pairing and the
SK Hafizul Islam   +4 more
openaire   +1 more source

CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks

2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017
Assured Mission Delivery Network (AMDN) is a collaborative network to support data-intensive scientific collaborations in a multi-cloud environment. Each scientific collaboration group, called a mission, specifies a set of rules to handle computing and network resources.
Jongho Won, Ankush Singla, Elisa Bertino
openaire   +1 more source

An efficient certificateless public key cryptography with authorized equality test in IIoT

Journal of Ambient Intelligence and Humanized Computing, 2019
Current time organizations have moved from the conventional industries to smart industries by embracing the approach of Industrial Internet of Things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies.
Rashad Elhabob   +3 more
openaire   +1 more source

Efficient Revocation of Security Capability in Certificateless Public Key Cryptography

2005
This paper presents the first mediated certificateless public key encryption and signature schemes. We also extend our schemes into hierarchical schemes. Our schemes does not suffer from the key escrow property that seems to be inherent in the mediated identity-based schemes.
Hak Soo Ju   +4 more
openaire   +1 more source

TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet

2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009
Identity-Based Cryptography (IBC) offers the very interesting property that the user's public key is related directly to her/his identity. However, IBC suffers from key escrow because the user private key is generated by an external entity called the Private Key Generator (PKG).
Ahmad Ahmad   +3 more
openaire   +1 more source

Authenticated key agreement protocol for virtual private network based on certificateless cryptography

2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire   +1 more source

Research on Certificateless Public Key Cryptography

Journal of Software, 2011
Fu-Tai ZHANG   +4 more
openaire   +1 more source

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Introduction to Certificateless Cryptography

2016
Hu Xiong   +2 more
openaire   +1 more source

Advanced cryptography technique in certificateless environment using SDBAES

International Journal of Advanced Intelligence Paradigms, 2018
C.G. Naveen Kumar, C. Chandrasekar
openaire   +1 more source

Home - About - Disclaimer - Privacy