Results 11 to 20 of about 1,501 (161)
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones. [PDF]
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Li Z, Ju Z, Zhao H, Wei Z, Lan G.
europepmc +2 more sources
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source
An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network. [PDF]
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs).
Luo C, Li D, Khan MS.
europepmc +2 more sources
Forgery attacks on several certificateless signature schemes
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003,a lot of certificateless signature schemes were proposed one after another.Recently,Tang et al proposed nine ...
Jing WANG, Zumeng LI
doaj +3 more sources
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh +2 more
doaj +1 more source
Cooperative Intelligent Transport Systems (C-ITSs) are an important development for society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable transportation through interconnected and intelligent communication between ...
Hannes Salin, Martin Lundgren
doaj +1 more source
Certificateless Proxy Re-encryption Scheme for Cloud Computing Security [PDF]
This paper researches Proxy Re-encryption(PRE) technology under the Certificateless Public Key Cryptography(CL-PKC),gives a formal definition and security model for certificateless PRE system and construct a new certificateless PRE scheme.The new scheme ...
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei
doaj +1 more source
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj +1 more source
Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj +1 more source
Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj +1 more source

