Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core +1 more source
Certificateless Public Key Cryptography: A Research Survey
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography. Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks. In this paper, we survey various public key encryption schemes on certificateless
Jacob Sayid +2 more
openaire +1 more source
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography [PDF]
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of ...
Hu Xiong, Fagen Li, Zhiguang Qin
openaire +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. [PDF]
Vehicular ad hoc networks (VANETs) provide a safer driving environment by allowing vehicles to broadcast safety related messages and inform neighbouring vehicles regarding traffic and road conditions.
Al-Riyami +11 more
core +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography [PDF]
In the traditional public key cryptosystem based on certificates, the issuance and management of usercertificates are realized through the authoritative certificate center, but amount of time is spent in thetransmission and verification of user public ...
Lina Zou, Xueying Wang, Lifeng Deng
doaj +1 more source
A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP [PDF]
Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is
Tang, Shanyu +2 more
core +1 more source
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment [PDF]
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the ...
Gururajan, Raj +3 more
core +2 more sources
Privacy-Preserving Public Complaint Platform using Certificateless Cryptography
Abstract - In the digital era, ensuring privacy in public communication with authorities is critical. Traditional online complaint systems often require identity verification through certificate-based infrastructures, which are not only complex but also raise significant privacy concerns.
Shajil S +2 more
+4 more sources

