Results 11 to 20 of about 1,501 (161)

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones. [PDF]

open access: yesSensors (Basel)
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Li Z, Ju Z, Zhao H, Wei Z, Lan G.
europepmc   +2 more sources

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network. [PDF]

open access: yesSci Rep
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with identity-based PKI and has recently been widely employed in anonymous communication schemes for vehicular adhoc networks (VANETs).
Luo C, Li D, Khan MS.
europepmc   +2 more sources

Forgery attacks on several certificateless signature schemes

open access: yes网络与信息安全学报, 2020
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003,a lot of certificateless signature schemes were proposed one after another.Recently,Tang et al proposed nine ...
Jing WANG, Zumeng LI
doaj   +3 more sources

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

open access: yesIEEE Access, 2020
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh   +2 more
doaj   +1 more source

A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems

open access: yesJournal of Cybersecurity and Privacy, 2023
Cooperative Intelligent Transport Systems (C-ITSs) are an important development for society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable transportation through interconnected and intelligent communication between ...
Hannes Salin, Martin Lundgren
doaj   +1 more source

Certificateless Proxy Re-encryption Scheme for Cloud Computing Security [PDF]

open access: yesJisuanji gongcheng, 2017
This paper researches Proxy Re-encryption(PRE) technology under the Certificateless Public Key Cryptography(CL-PKC),gives a formal definition and security model for certificateless PRE system and construct a new certificateless PRE scheme.The new scheme ...
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei
doaj   +1 more source

Design Principles of Secure Certificateless Signature and Aggregate Signature Schemes for IoT Environments

open access: yesIEEE Access, 2022
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj   +1 more source

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]

open access: yesPLoS ONE, 2017
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj   +1 more source

Home - About - Disclaimer - Privacy