Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj +1 more source
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou +5 more
doaj +1 more source
Certificateless cryptography with KGC trust level 3
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, G., Tan, C.H.
openaire +3 more sources
An efficient certificateless blind signature scheme without bilinear pairing
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG +3 more
doaj +1 more source
Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj +1 more source
Certificateless Public Key Cryptography: A Research Survey
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography. Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks. In this paper, we survey various public key encryption schemes on certificateless
Jacob Sayid +2 more
openaire +1 more source
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography [PDF]
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of ...
Hu Xiong, Fagen Li, Zhiguang Qin
openaire +1 more source
Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography [PDF]
In the traditional public key cryptosystem based on certificates, the issuance and management of usercertificates are realized through the authoritative certificate center, but amount of time is spent in thetransmission and verification of user public ...
Lina Zou, Xueying Wang, Lifeng Deng
doaj +1 more source
Privacy-Preserving Public Complaint Platform using Certificateless Cryptography
Abstract - In the digital era, ensuring privacy in public communication with authorities is critical. Traditional online complaint systems often require identity verification through certificate-based infrastructures, which are not only complex but also raise significant privacy concerns.
Shajil S +2 more
+4 more sources
A Provably Secure Ring Signature Scheme in Certificateless Cryptography [PDF]
Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson in Asiacrypt 2003.
Zhang, Lei, Zhang, Futai, Wu, Wei
openaire +2 more sources

