Results 1 to 10 of about 414 (137)

A certificateless aggregate signature scheme for VANETs with privacy protection properties. [PDF]

open access: yesPLoS ONE
Aggregate signatures are excellent in simultaneously verifying the validity of multiple signatures, which renders them highly suitable for bandwidth-constrained environments.
Huimin Li   +3 more
doaj   +2 more sources

Certificateless threshold signature from lattice

open access: yesDigital Communications and Networks
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory ...
Huifang Yu, Qi Zhang
doaj   +2 more sources

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]

open access: yesJisuanji kexue, 2021
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj   +1 more source

Forgery attacks on several certificateless signature schemes

open access: yes网络与信息安全学报, 2020
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine
WANG Jing, LI Zumeng
doaj   +3 more sources

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

Certificateless Proxy Signature from RSA [PDF]

open access: yesMathematical Problems in Engineering, 2014
Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.
Deng, Lunzhi, Zeng, Jiwen, Qu, Yunyun
openaire   +3 more sources

A provably security and efficient certificateless short signature scheme [PDF]

open access: yesJisuanji gongcheng, 2019
In the certificateless cryptography system,there is no authentication relationship between the public key and the holder,which may cause a problem that a malicious user replaces the user’s public key.To This end,this paper improves the definition of ...
ZUO Liming,ZHOU Qing,CHEN Lanlan
doaj   +1 more source

Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations

open access: yesThe Scientific World Journal, 2014
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj   +1 more source

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

Lattice-Based Revocable Certificateless Signature

open access: yesSymmetry, 2017
Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization ...
Hung, Ying-Hao   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy