Results 11 to 20 of about 1,535 (180)

An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network

open access: yesIEEE Access, 2020
A Flying Ad-hoc Network (FANET) consists of Unmanned Aerial Vehicles (UAVs) tasked to handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, i.e.
Muhammad Asghar Khan   +6 more
doaj   +3 more sources

Design Principles of Secure Certificateless Signature and Aggregate Signature Schemes for IoT Environments

open access: yesIEEE Access, 2022
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj   +1 more source

A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography [PDF]

open access: yesComputer Communications, 2007
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the Internet. However, SIP authentication typically uses HTTP digest authentication, which is vulnerable to many forms of known attacks. This paper proposes a new secure authentication and key agreement mechanism based on certificateless public-key ...
Fengjiao Wang, Yuqing Zhang
openaire   +1 more source

Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography

open access: yesInternational Journal of Network Security & Its Applications, 2012
Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by certificate authorities (CAs), The process of getting certificates from a ...
Sarkar, Arpita, Tripathi, Sachin
openaire   +2 more sources

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. [PDF]

open access: yesPLoS ONE, 2017
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum ...
Sumithra Alagarsamy, S P Rajagopalan
doaj   +1 more source

Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
In the traditional public key cryptosystem based on certificates, the issuance and management of usercertificates are realized through the authoritative certificate center, but amount of time is spent in thetransmission and verification of user public ...
Lina Zou, Xueying Wang, Lifeng Deng
doaj   +1 more source

A concrete certificateless signature scheme without pairings [PDF]

open access: yes, 2009
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core   +2 more sources

Certificateless Public Key Cryptography [PDF]

open access: yes, 2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an
Sattam S. Al-Riyami, Kenneth G. Paterson
openaire   +1 more source

Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks [PDF]

open access: yes, 2008
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes ...
Fagen Li   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy