Results 21 to 30 of about 2,177 (206)

Aggregatable Certificateless Designated Verifier Signature [PDF]

open access: yesIEEE Access, 2020
In recent years, the Internet of Things (IoT) devices have become increasingly deployed in many industries and generated a large amount of data that needs to be processed in a timely and efficient manner. Using aggregate signatures, it provides a secure and efficient way to handle large numbers of digital signatures with the same message. Recently, the
Pairat Thorncharoensri   +2 more
openaire   +3 more sources

A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. [PDF]

open access: yes, 2014
Vehicular ad hoc networks (VANETs) provide a safer driving environment by allowing vehicles to broadcast safety related messages and inform neighbouring vehicles regarding traffic and road conditions.
Al-Riyami   +11 more
core   +1 more source

Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]

open access: yesJisuanji gongcheng, 2023
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj   +1 more source

Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]

open access: yes, 2018
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core   +3 more sources

A Revocable Certificateless Signature Scheme [PDF]

open access: yesJournal of Computers, 2014
Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, how to revoke a user in certificateless cryptosystem still remains a problem: the existing solutions are not practical for use due to either a costly mediator or enormous computation (secret
Yinxia Sun, Futai Zhang, Limin Shen
openaire   +1 more source

Certificateless Aggregate Signature Scheme for Privacy Protection in VANET [PDF]

open access: yesJisuanji gongcheng, 2020
In Vehicular Ad-hoc Network(VANET),problems such as vulnerable communication data and low computational efficiency are ubiquitous.This paper proposes a certificateless aggregation signature scheme based on certificateless public key cryptosystem and ...
ZHAO Nan, ZHANG Guoan, GU Xiaohui
doaj   +1 more source

SPATA: Strong Pseudonym based AuthenTicAtion in Intelligent Transport System [PDF]

open access: yes, 2018
Intelligent Transport System (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of ...
Ahmad, Naveed   +6 more
core   +1 more source

Certificateless Network Coding Ring Signature Scheme [PDF]

open access: yesSecurity and Communication Networks, 2021
Traditional certificateless ring signature is not suitable for the network coding environment. In this view, a new certificateless network coding ring signature (CL-NCRS) is devised by using the techniques of multisource network coding and certificateless ring signature.
Huifang Yu, Weike Wang
openaire   +1 more source

Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
In the traditional public key cryptosystem based on certificates, the issuance and management of usercertificates are realized through the authoritative certificate center, but amount of time is spent in thetransmission and verification of user public ...
Lina Zou, Xueying Wang, Lifeng Deng
doaj   +1 more source

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

Home - About - Disclaimer - Privacy