Results 41 to 50 of about 1,777 (202)
A Provably Secure Ring Signature Scheme in Certificateless Cryptography [PDF]
Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson in Asiacrypt 2003.
Zhang, Lei, Zhang, Futai, Wu, Wei
openaire +2 more sources
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang +3 more
doaj +1 more source
Cryptanalysis and improvement of an efficient certificateless signature scheme
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core +1 more source
Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability
With the widespread application of cloud storage, users could obtain many conveniences such as low-price data remote storage and flexible data sharing.
Xiaodong Yang +4 more
doaj +1 more source
Online/Offline Heterogeneous Signcryption Scheme for WSN [PDF]
Aiming at the weak security problem of communication between the sensor nodes and the Internet hosts,a CLPKC-to-TPKC online/offline Heterogeneous Signcryption(HSC) scheme is proposed.Based on the online/offline technology,this paper defines a formalized ...
DANG Xiaochao,LI Qi,HAO Zhanjun,ZHANG Yulei,ZHANG Linggang
doaj +1 more source
Security analysis and improvement of a certificateless signcryption scheme
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj +2 more sources
An Efficient Heterogeneous Signcryption Scheme from Certificateless to Identity-based Cryptosystem
The heterogeneous signcryption can not only realize the confidentiality and un-forgeability of the information transmission between different public key cryptography environments, but also reduce the communication cost. The proposed scheme uses bilin-ear
Niu Shufen +4 more
doaj +1 more source
SPATA: Strong Pseudonym based AuthenTicAtion in Intelligent Transport System [PDF]
Intelligent Transport System (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of ...
Ahmad, Naveed +6 more
core +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
Practical Certificateless Aggregate Signatures From Bilinear Maps [PDF]
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage ...
Chen, Kefei +3 more
core +4 more sources

