Results 121 to 130 of about 453 (176)
Some of the next articles are maybe not open access.

Hierarchical Certificateless Signatures

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by ...
Lei Zhang   +3 more
openaire   +1 more source

Efficient Certificateless Proxy Signature Scheme

International Journal of Foundations of Computer Science, 2016
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is ...
Deng, Lunzhi, Zeng, Jiwen, Huang, Huawei
openaire   +1 more source

Certificateless Partially Blind Signature

2012 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Blind signatures play a central role in applications such as e-cash and e-voting systems, while partially blind signature is an even more applicable variant. This paper proposes a Certificate less Partially Blind Signature (CPBS) by laying its construction on bilinear pairings over Gap Diffie-Hellman (GDH) Group for solving the key escrow problem in ...
Jingwei Liu   +3 more
openaire   +1 more source

Certificateless proxy multi-signature

Information Sciences, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Du, Hongzhen, Wen, Qiaoyan
openaire   +2 more sources

Certificateless Partially Blind Signatures

2009 First International Conference on Information Science and Engineering, 2009
Partially blind signature is a variant of blind signature. It allows a signer to explicitly include common information in a blind signature under some agreement with a receiver. It provides anonymity of users in applications such as electronic voting and electronic payment systems. While certificateless public key cryptography eliminates the key escrow
Lei Zhang, Futai Zhang
openaire   +1 more source

Certificateless Signature Revisited

2007
In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures.
Huang, Xinyi   +4 more
openaire   +2 more sources

Certificateless multi-proxy signature

Computer Communications, 2011
Multi-proxy signature is a scheme that an original signer authorizes a proxy group as his proxy agent and later only the cooperation of all proxy signers in the proxy group could sign messages on behalf of the original signer. To our best knowledge, most of the existing multi-proxy signature schemes are proposed in public key infrastructure or identity-
Zhengping Jin, Qiaoyan Wen
openaire   +1 more source

Certificateless group inside signature

Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005., 2005
In distributed networks, the signer wants his signature to be verified by anyone in the same group with him and the recipient wants to verify the signature independently. Motivated by this consideration, a certificateless group inside signature is presented in this paper.
null Chunbo Ma   +2 more
openaire   +1 more source

Certificateless Aggregate Signature Scheme

2010 International Conference on E-Business and E-Government, 2010
This paper puts forward a secure construction of certificateless aggregate signature scheme using bilinear maps. The security of our scheme is based on the infeasibility of the Computational Diffie-Hellman problem and is formally proven in the strongest security model of certificateless aggregate signature schemes.
Chen Hu, Song Wangan, Zhao Bing
openaire   +1 more source

Certificateless Concurrent Signature Scheme

2008 The 9th International Conference for Young Computer Scientists, 2008
Certificateless public key cryptography was introduced to remove the use of certificate to ensure the authentication of the user's public key in the traditional certificate-based public key cryptography and overcome he key escrow problem in the identity-based public key cryptography.
Zhenjie Huang, Xuanzhi Lin, Rufen Huang
openaire   +1 more source

Home - About - Disclaimer - Privacy