Results 131 to 140 of about 453 (176)
Some of the next articles are maybe not open access.
Certificateless verifiably encrypted signature scheme
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content, 2010In this paper, we study the construction of verifiably encrypted signature in certificateless public key setting. We first present the notion and the new security model for certificateless verifiably encrypted signature (CLVES) and then present a concrete CLVES scheme based on Zhang's certificateless signature (CLS) [1], and provide the security ...
Bo Yang, Zibi Xiao, Shougui Li
openaire +1 more source
Strongly secure certificateless short signatures
Journal of Systems and Software, 2012Highlights? We introduce a new efficient and secure short certificateless signature scheme. ? It is strongly unforgeable. ? The security is based on the CDH assumption. ? The proposed scheme is provably secure against a relatively stronger adversary. Short certificateless signatures have come into limelight in recent years.
Tso, Raylin, Susilo, Willy, Huang, Xinyi
openaire +2 more sources
Practical certificateless short signature scheme
International Journal of Electronic Security and Digital Forensics, 2014Certificateless cryptography is an attractive paradigm for public key cryptography since it does not require certificates in traditional public key cryptography and also solves the inherent key escrow problem in identity-based cryptography. Currently, certificateless short signature is receiving significant attention from the public key cryptography ...
Miaomiao Tian, Liusheng Huang, Wei Yang
openaire +1 more source
Certificateless Directed Signature Scheme
2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011In directed signature schemes, only a designated verifier can both verify the signature by himself, and also interact with a signer to prove the (in)validity of a given signature intended to him. In this paper, we propose the first certificateless directed signature scheme which is provably secure in the random oracle model.
openaire +1 more source
Certificateless Designated Verifier Signature Schemes
20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2006Designated verifier signature schemes allow a signer to convince a designated verifier, in such a way that only the designated verifier will believe with the authenticity of such a signature. The previous constructions of designated verifier signature rely on the underlying Public Key Infrastructure, that requires both signer and verifier to verify the
null Xinyi Huang +3 more
openaire +1 more source
Efficient Certificateless Signature Schemes
2007Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity based cryptography, the notion of certificateless public key cryptography was introduced. In this paper, to construct an efficient certificateless signature (CLS) scheme, we present a new approach compactly and ...
Kyu Young Choi +3 more
openaire +1 more source
Improved certificateless multi-proxy signature
The Journal of China Universities of Posts and Telecommunications, 2012Abstract Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature
Jie XU +3 more
openaire +1 more source
Certificateless undeniable signature scheme
Information Sciences, 2008zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
Security Mediated Certificateless Signatures
2007In PKC 2006, Chow, Boyd and Gonzalez Neito introduced the notion of security mediated certificateless (SMC) cryptography. SMC cryptography equips certificateless cryptography with instantaneous revocation. They presented a formal security model with two constructions for SMC encryption. This paper studies SMC signatures.
Yap, Nvun-She +3 more
openaire +2 more sources
Certificateless Threshold Signature Schemes
2005We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings.
Licheng Wang +3 more
openaire +1 more source

