An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
A certificateless aggregate signature scheme for security and privacy protection in VANET
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi +3 more
doaj +1 more source
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment [PDF]
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the ...
Gururajan, Raj +3 more
core +2 more sources
Cryptanalysis and improvement of an efficient certificateless signature scheme
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core +1 more source
Fully Secure Lightweight Certificateless Signature Scheme for IIoT
In recent years, Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. Inevitably, security for IIoT has become a priority in order to deploy secure applications.
Fatemeh Rezaeibagha +4 more
doaj +1 more source
Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core +1 more source
Certificateless-based efficient aggregate signature scheme with universal designated verifier
The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the ...
Yu-lei ZHANG +4 more
doaj +2 more sources
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj +1 more source
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj +1 more source

