Results 91 to 100 of about 1,931 (198)

Certificateless Multi-Signature Based on SM2 Algorithm and Its Application in Blockchain Transaction [PDF]

open access: yesJisuanji gongcheng
Multi-signature is widely used in blockchain transaction schemes. Despite increasing demand for the localization of blockchain applications, research on multi-signature has not sufficiently focused on secure and efficient SM2 algorithms.
ZHU Bingcheng, ZHOU Feng, TIAN Youliang, XIANG Axin, XIONG Wei, PENG Changgen
doaj   +1 more source

Development of a certificate less digital signature scheme & implementation in e-cash system [PDF]

open access: yes, 2012
Today’s wireless communication systems having limited computational resources and communication bandwidth find certificate less public-key cryptosystems very attractive and vital to their operations in the sense that they help in reducing a significant ...
Lenka, Mrutyunjaya, Sahoo, Pravat Kumar
core  

A secure Certificateless Aggregate Signature Scheme

open access: yesInternational Journal of Security and Its Applications, 2016
Aggregate signatures allow n signatures on n distinct messages from n distinct signers to be aggregated into a single signature that convinces any verifier that n signers do indeed sign the n messages, respectively. The major advantage of utilizing aggregate signatures is to address the security of data and save bandwidth and computations in sensor ...
Baoyuan Kang, Danhui Xu
openaire   +1 more source

Certificateless strong designated verifier multi-signature

open access: yesTongxin xuebao, 2016
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

An Online-Offline Certificateless Signature Scheme for Internet of Health Things. [PDF]

open access: yesJ Healthc Eng, 2020
Khan MA   +6 more
europepmc   +1 more source

Introducing Accountability to Anonymity Networks [PDF]

open access: yes, 2013
Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes risk sanctions by law enforcement if users commit illegal actions ...
Backes, Michael   +4 more
core  

New Certificateless Blind Ring Signature Scheme

open access: yesTELKOMNIKA Indonesian Journal of Electrical Engineering, 2014
A new certificateless blind ring signature scheme was proposed in this paper. The scheme could not only avoid the problem of certificate management of public key certificate cryptography, but also overcome the inherent key-escrow problem of identity-based public key cryptography. In the last, by using bilinear pairing technique, it was proved that this
openaire   +1 more source

Cryptanalysis and improvement of several certificateless digital signature schemes

open access: yesTongxin xuebao, 2008
The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007),Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.
WANG Hua-qun1   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy