Results 81 to 90 of about 2,177 (206)

A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification

open access: yesIEEE Access
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information of ...
Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu
doaj   +1 more source

New certificateless short signature scheme

open access: yesIET Information Security, 2013
The certificateless public key cryptography has attracted wide attention since it could solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity‐based public key cryptography. Recently, several certificateless short signature schemes, which could satisfy the requirement of low ...
Debiao He, Baojun Huang, Jianhua Chen
openaire   +1 more source

Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model

open access: yesTongxin xuebao, 2014
Certificate less sequential multi-signature scheme could resolve the problem of authentication of recommendation information transmitted through trust train.Qin yan-lin,et al proposed an efficient certificateless sequential multi-signature scheme,and ...
Yan XU   +3 more
doaj   +2 more sources

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud

open access: yesIEEE Access, 2019
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao   +3 more
doaj   +1 more source

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]

open access: yes
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem Eiza, Mahmoud   +3 more
core   +2 more sources

Cryptanalysis and improvement of several certificateless digital signature schemes

open access: yesTongxin xuebao, 2008
The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007),Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.
WANG Hua-qun1   +2 more
doaj   +2 more sources

Certificateless Multi-Signature Based on SM2 Algorithm and Its Application in Blockchain Transaction [PDF]

open access: yesJisuanji gongcheng
Multi-signature is widely used in blockchain transaction schemes. Despite increasing demand for the localization of blockchain applications, research on multi-signature has not sufficiently focused on secure and efficient SM2 algorithms.
ZHU Bingcheng, ZHOU Feng, TIAN Youliang, XIANG Axin, XIONG Wei, PENG Changgen
doaj   +1 more source

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

Home - About - Disclaimer - Privacy