Results 91 to 100 of about 1,921 (200)

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue.
Hongzhen Du, QiaoYan Wen, Shanshan Zhang
doaj   +1 more source

A secure Certificateless Aggregate Signature Scheme

open access: yesInternational Journal of Security and Its Applications, 2016
Aggregate signatures allow n signatures on n distinct messages from n distinct signers to be aggregated into a single signature that convinces any verifier that n signers do indeed sign the n messages, respectively. The major advantage of utilizing aggregate signatures is to address the security of data and save bandwidth and computations in sensor ...
Baoyuan Kang, Danhui Xu
openaire   +1 more source

Certificateless strong designated verifier multi-signature

open access: yesTongxin xuebao, 2016
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

An Online-Offline Certificateless Signature Scheme for Internet of Health Things. [PDF]

open access: yesJ Healthc Eng, 2020
Khan MA   +6 more
europepmc   +1 more source

On the security models for certificateless signature schemes achieving level 3 security [PDF]

open access: yes, 2011
Public key cryptography has found many applications in our modern society. To guarantee the authenticity of public keys, we need a trusted third party (TTP). In 1991, Girault defined three trust levels for a TTP.
Gwoboa Horng, Yu-Chi Chen
core  

New Certificateless Blind Ring Signature Scheme

open access: yesTELKOMNIKA Indonesian Journal of Electrical Engineering, 2014
A new certificateless blind ring signature scheme was proposed in this paper. The scheme could not only avoid the problem of certificate management of public key certificate cryptography, but also overcome the inherent key-escrow problem of identity-based public key cryptography. In the last, by using bilinear pairing technique, it was proved that this
openaire   +1 more source

Cryptanalysis and improvement of several certificateless digital signature schemes

open access: yesTongxin xuebao, 2008
The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007),Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.
WANG Hua-qun1   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy