An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core +1 more source
A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue.
Hongzhen Du, QiaoYan Wen, Shanshan Zhang
doaj +1 more source
A secure Certificateless Aggregate Signature Scheme
Aggregate signatures allow n signatures on n distinct messages from n distinct signers to be aggregated into a single signature that convinces any verifier that n signers do indeed sign the n messages, respectively. The major advantage of utilizing aggregate signatures is to address the security of data and save bandwidth and computations in sensor ...
Baoyuan Kang, Danhui Xu
openaire +1 more source
Certificateless strong designated verifier multi-signature
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj +2 more sources
An Online-Offline Certificateless Signature Scheme for Internet of Health Things. [PDF]
Khan MA +6 more
europepmc +1 more source
On the security models for certificateless signature schemes achieving level 3 security [PDF]
Public key cryptography has found many applications in our modern society. To guarantee the authenticity of public keys, we need a trusted third party (TTP). In 1991, Girault defined three trust levels for a TTP.
Gwoboa Horng, Yu-Chi Chen
core
New Certificateless Blind Ring Signature Scheme
A new certificateless blind ring signature scheme was proposed in this paper. The scheme could not only avoid the problem of certificate management of public key certificate cryptography, but also overcome the inherent key-escrow problem of identity-based public key cryptography. In the last, by using bilinear pairing technique, it was proved that this
openaire +1 more source
A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments. [PDF]
Yang X +5 more
europepmc +1 more source
Cryptanalysis and improvement of several certificateless digital signature schemes
The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007),Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.
WANG Hua-qun1 +2 more
doaj +2 more sources
A New Efficient and Provably Secure Certificateless Signature Scheme Without Bilinear Pairings for the Internet of Things. [PDF]
Wei Z, Liu X, Zhao H, Li Z, Liu B.
europepmc +1 more source

