Results 131 to 140 of about 453 (176)
Some of the next articles are maybe not open access.

Certificateless verifiably encrypted signature scheme

2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content, 2010
In this paper, we study the construction of verifiably encrypted signature in certificateless public key setting. We first present the notion and the new security model for certificateless verifiably encrypted signature (CLVES) and then present a concrete CLVES scheme based on Zhang's certificateless signature (CLS) [1], and provide the security ...
Bo Yang, Zibi Xiao, Shougui Li
openaire   +1 more source

Strongly secure certificateless short signatures

Journal of Systems and Software, 2012
Highlights? We introduce a new efficient and secure short certificateless signature scheme. ? It is strongly unforgeable. ? The security is based on the CDH assumption. ? The proposed scheme is provably secure against a relatively stronger adversary. Short certificateless signatures have come into limelight in recent years.
Tso, Raylin, Susilo, Willy, Huang, Xinyi
openaire   +2 more sources

Practical certificateless short signature scheme

International Journal of Electronic Security and Digital Forensics, 2014
Certificateless cryptography is an attractive paradigm for public key cryptography since it does not require certificates in traditional public key cryptography and also solves the inherent key escrow problem in identity-based cryptography. Currently, certificateless short signature is receiving significant attention from the public key cryptography ...
Miaomiao Tian, Liusheng Huang, Wei Yang
openaire   +1 more source

Certificateless Directed Signature Scheme

2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011
In directed signature schemes, only a designated verifier can both verify the signature by himself, and also interact with a signer to prove the (in)validity of a given signature intended to him. In this paper, we propose the first certificateless directed signature scheme which is provably secure in the random oracle model.
openaire   +1 more source

Certificateless Designated Verifier Signature Schemes

20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2006
Designated verifier signature schemes allow a signer to convince a designated verifier, in such a way that only the designated verifier will believe with the authenticity of such a signature. The previous constructions of designated verifier signature rely on the underlying Public Key Infrastructure, that requires both signer and verifier to verify the
null Xinyi Huang   +3 more
openaire   +1 more source

Efficient Certificateless Signature Schemes

2007
Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity based cryptography, the notion of certificateless public key cryptography was introduced. In this paper, to construct an efficient certificateless signature (CLS) scheme, we present a new approach compactly and ...
Kyu Young Choi   +3 more
openaire   +1 more source

Improved certificateless multi-proxy signature

The Journal of China Universities of Posts and Telecommunications, 2012
Abstract Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature
Jie XU   +3 more
openaire   +1 more source

Certificateless undeniable signature scheme

Information Sciences, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Security Mediated Certificateless Signatures

2007
In PKC 2006, Chow, Boyd and Gonzalez Neito introduced the notion of security mediated certificateless (SMC) cryptography. SMC cryptography equips certificateless cryptography with instantaneous revocation. They presented a formal security model with two constructions for SMC encryption. This paper studies SMC signatures.
Yap, Nvun-She   +3 more
openaire   +2 more sources

Certificateless Threshold Signature Schemes

2005
We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings.
Licheng Wang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy