Results 21 to 30 of about 1,777 (202)

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]

open access: yes, 2015
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline   +2 more
core   +2 more sources

Malicious KGC attacks in certificateless cryptography

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. If the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem.
AU, Man Ho   +5 more
openaire   +2 more sources

Quantum attack-resistent certificateless multi-receiver signcryption scheme. [PDF]

open access: yesPLoS ONE, 2013
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm.
Huixian Li   +3 more
doaj   +1 more source

Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]

open access: yes, 2018
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core   +3 more sources

An efficient certificateless blind signature scheme without bilinear pairing

open access: yesAnais da Academia Brasileira de Ciências, 2014
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public ...
GUOFAGN DONG   +3 more
doaj   +1 more source

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

open access: yesIEEE Access, 2020
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj   +1 more source

A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm

open access: yesHigh-Confidence Computing, 2023
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou   +5 more
doaj   +1 more source

Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]

open access: yes, 2016
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline   +2 more
core   +3 more sources

Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]

open access: yesPLoS ONE, 2017
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj   +1 more source

Home - About - Disclaimer - Privacy