Results 21 to 30 of about 437 (175)

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

open access: yesIEEE Access, 2020
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj   +1 more source

A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm

open access: yesHigh-Confidence Computing, 2023
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou   +5 more
doaj   +1 more source

Certificateless cryptography with KGC trust level 3

open access: yesTheoretical Computer Science, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, G., Tan, C.H.
openaire   +3 more sources

An efficient certificateless blind signature scheme without bilinear pairing

open access: yesAnais da Academia Brasileira de Ciências, 2014
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG   +3 more
doaj   +1 more source

Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]

open access: yesPLoS ONE, 2017
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj   +1 more source

Certificateless Public Key Cryptography: A Research Survey

open access: yesInternational Journal of Security and Its Applications, 2016
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography. Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks. In this paper, we survey various public key encryption schemes on certificateless
Jacob Sayid   +2 more
openaire   +1 more source

A Provably Secure Proxy Signature Scheme in Certificateless Cryptography [PDF]

open access: yesInformatica, 2010
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of ...
Hu Xiong, Fagen Li, Zhiguang Qin
openaire   +1 more source

Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
In the traditional public key cryptosystem based on certificates, the issuance and management of usercertificates are realized through the authoritative certificate center, but amount of time is spent in thetransmission and verification of user public ...
Lina Zou, Xueying Wang, Lifeng Deng
doaj   +1 more source

Privacy-Preserving Public Complaint Platform using Certificateless Cryptography

open access: yes2025 International Conference on Electronics and Renewable Systems (ICEARS)
Abstract - In the digital era, ensuring privacy in public communication with authorities is critical. Traditional online complaint systems often require identity verification through certificate-based infrastructures, which are not only complex but also raise significant privacy concerns.
Shajil S   +2 more
  +4 more sources

A Provably Secure Ring Signature Scheme in Certificateless Cryptography [PDF]

open access: yes, 2007
Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson in Asiacrypt 2003.
Zhang, Lei, Zhang, Futai, Wu, Wei
openaire   +2 more sources

Home - About - Disclaimer - Privacy