Results 11 to 20 of about 437 (175)
Security-Mediated Certificateless Cryptography [PDF]
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has been used in all previous mediated cryptography algorithms. We provide a model of security
Chow, Sherman +2 more
openaire +2 more sources
Certificateless Proxy Re-encryption Scheme for Cloud Computing Security [PDF]
This paper researches Proxy Re-encryption(PRE) technology under the Certificateless Public Key Cryptography(CL-PKC),gives a formal definition and security model for certificateless PRE system and construct a new certificateless PRE scheme.The new scheme ...
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei
doaj +1 more source
Certificateless Public Key Cryptography [PDF]
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an
Sattam S. Al-Riyami, Kenneth G. Paterson
openaire +1 more source
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj +1 more source
Revocable identity‐based matchmaking encryption in the standard model
RIB‐ME provides the features of data confidentiality, sender authenticity and efficient revocation, where the security can be reduced to static assumptions in the standard model. Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access ...
Zhe Jiang +5 more
wiley +1 more source
Heterogeneous hybrid signcryption for multi-message and multi-receiver. [PDF]
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a ...
Shufen Niu +4 more
doaj +1 more source
A provably security and efficient certificateless short signature scheme [PDF]
In the certificateless cryptography system,there is no authentication relationship between the public key and the holder,which may cause a problem that a malicious user replaces the user’s public key.To This end,this paper improves the definition of ...
ZUO Liming,ZHOU Qing,CHEN Lanlan
doaj +1 more source
On the Security of Certificateless Signature Schemes
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj +1 more source
Malicious KGC attacks in certificateless cryptography
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. If the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem.
AU, Man Ho +5 more
openaire +2 more sources
Quantum attack-resistent certificateless multi-receiver signcryption scheme. [PDF]
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm.
Huixian Li +3 more
doaj +1 more source

