Results 81 to 90 of about 2,177 (206)
A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information of ...
Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu
doaj +1 more source
New certificateless short signature scheme
The certificateless public key cryptography has attracted wide attention since it could solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity‐based public key cryptography. Recently, several certificateless short signature schemes, which could satisfy the requirement of low ...
Debiao He, Baojun Huang, Jianhua Chen
openaire +1 more source
Certificate less sequential multi-signature scheme could resolve the problem of authentication of recommendation information transmitted through trust train.Qin yan-lin,et al proposed an efficient certificateless sequential multi-signature scheme,and ...
Yan XU +3 more
doaj +2 more sources
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source
Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao +3 more
doaj +1 more source
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem Eiza, Mahmoud +3 more
core +2 more sources
Cryptanalysis and improvement of several certificateless digital signature schemes
The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007),Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.
WANG Hua-qun1 +2 more
doaj +2 more sources
Certificateless Multi-Signature Based on SM2 Algorithm and Its Application in Blockchain Transaction [PDF]
Multi-signature is widely used in blockchain transaction schemes. Despite increasing demand for the localization of blockchain applications, research on multi-signature has not sufficiently focused on secure and efficient SM2 algorithms.
ZHU Bingcheng, ZHOU Feng, TIAN Youliang, XIANG Axin, XIONG Wei, PENG Changgen
doaj +1 more source
An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core +1 more source

