Results 31 to 40 of about 1,777 (202)

Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]

open access: yes, 2010
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core   +1 more source

Certificateless Public Key Cryptography: A Research Survey

open access: yesInternational Journal of Security and Its Applications, 2016
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography. Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks. In this paper, we survey various public key encryption schemes on certificateless
Jacob Sayid   +2 more
openaire   +1 more source

A Provably Secure Proxy Signature Scheme in Certificateless Cryptography [PDF]

open access: yesInformatica, 2010
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of ...
Hu Xiong, Fagen Li, Zhiguang Qin
openaire   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. [PDF]

open access: yes, 2014
Vehicular ad hoc networks (VANETs) provide a safer driving environment by allowing vehicles to broadcast safety related messages and inform neighbouring vehicles regarding traffic and road conditions.
Al-Riyami   +11 more
core   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
In the traditional public key cryptosystem based on certificates, the issuance and management of usercertificates are realized through the authoritative certificate center, but amount of time is spent in thetransmission and verification of user public ...
Lina Zou, Xueying Wang, Lifeng Deng
doaj   +1 more source

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP [PDF]

open access: yes, 2016
Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is
Tang, Shanyu   +2 more
core   +1 more source

Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment [PDF]

open access: yes, 2010
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the ...
Gururajan, Raj   +3 more
core   +2 more sources

Privacy-Preserving Public Complaint Platform using Certificateless Cryptography

open access: yes2025 International Conference on Electronics and Renewable Systems (ICEARS)
Abstract - In the digital era, ensuring privacy in public communication with authorities is critical. Traditional online complaint systems often require identity verification through certificate-based infrastructures, which are not only complex but also raise significant privacy concerns.
Shajil S   +2 more
  +4 more sources

Home - About - Disclaimer - Privacy