Results 1 to 10 of about 2,177 (206)
Certificateless threshold signature from lattice
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory ...
Huifang Yu, Qi Zhang
doaj +2 more sources
A certificateless aggregate signature scheme for VANETs with privacy protection properties. [PDF]
Aggregate signatures are excellent in simultaneously verifying the validity of multiple signatures, which renders them highly suitable for bandwidth-constrained environments.
Huimin Li +3 more
doaj +2 more sources
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [PDF]
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem ...
YE Sheng-nan, CHEN Jian-hua
doaj +1 more source
Forgery attacks on several certificateless signature schemes
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine
WANG Jing, LI Zumeng
doaj +3 more sources
A New Certificateless Aggregate Signature Scheme [PDF]
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj +1 more source
Certificateless Proxy Signature from RSA [PDF]
Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.
Deng, Lunzhi, Zeng, Jiwen, Qu, Yunyun
openaire +3 more sources
A provably security and efficient certificateless short signature scheme [PDF]
In the certificateless cryptography system,there is no authentication relationship between the public key and the holder,which may cause a problem that a malicious user replaces the user’s public key.To This end,this paper improves the definition of ...
ZUO Liming,ZHOU Qing,CHEN Lanlan
doaj +1 more source
Revocable identity‐based matchmaking encryption in the standard model
RIB‐ME provides the features of data confidentiality, sender authenticity and efficient revocation, where the security can be reduced to static assumptions in the standard model. Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access ...
Zhe Jiang +5 more
wiley +1 more source
Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian +5 more
wiley +1 more source
A concrete certificateless signature scheme without pairings [PDF]
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core +2 more sources

