Results 11 to 20 of about 437 (175)

Security-Mediated Certificateless Cryptography [PDF]

open access: yes, 2006
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has been used in all previous mediated cryptography algorithms. We provide a model of security
Chow, Sherman   +2 more
openaire   +2 more sources

Certificateless Proxy Re-encryption Scheme for Cloud Computing Security [PDF]

open access: yesJisuanji gongcheng, 2017
This paper researches Proxy Re-encryption(PRE) technology under the Certificateless Public Key Cryptography(CL-PKC),gives a formal definition and security model for certificateless PRE system and construct a new certificateless PRE scheme.The new scheme ...
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei
doaj   +1 more source

Certificateless Public Key Cryptography [PDF]

open access: yes, 2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an
Sattam S. Al-Riyami, Kenneth G. Paterson
openaire   +1 more source

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Revocable identity‐based matchmaking encryption in the standard model

open access: yesIET Information Security, Volume 17, Issue 4, Page 567-581, July 2023., 2023
RIB‐ME provides the features of data confidentiality, sender authenticity and efficient revocation, where the security can be reduced to static assumptions in the standard model. Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access ...
Zhe Jiang   +5 more
wiley   +1 more source

Heterogeneous hybrid signcryption for multi-message and multi-receiver. [PDF]

open access: yesPLoS ONE, 2017
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a ...
Shufen Niu   +4 more
doaj   +1 more source

A provably security and efficient certificateless short signature scheme [PDF]

open access: yesJisuanji gongcheng, 2019
In the certificateless cryptography system,there is no authentication relationship between the public key and the holder,which may cause a problem that a malicious user replaces the user’s public key.To This end,this paper improves the definition of ...
ZUO Liming,ZHOU Qing,CHEN Lanlan
doaj   +1 more source

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

Malicious KGC attacks in certificateless cryptography

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. If the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem.
AU, Man Ho   +5 more
openaire   +2 more sources

Quantum attack-resistent certificateless multi-receiver signcryption scheme. [PDF]

open access: yesPLoS ONE, 2013
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm.
Huixian Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy