Results 141 to 150 of about 1,921 (200)
Privacy preservation in blockchain-based healthcare data sharing: A systematic review. [PDF]
Li K, Lohachab A, Dumontier M, Urovi V.
europepmc +1 more source
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source
SMAD-LDS: enhanced secure message authentication and dissemination with lightweight digital signature in the Internet of Vehicles. [PDF]
Ahmed IZ, Hifny Y, Sadek RA.
europepmc +1 more source
Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks. [PDF]
Zhang Y, Tang Y, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Efficient Certificateless Proxy Signature Scheme
International Journal of Foundations of Computer Science, 2016A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is ...
Deng, Lunzhi, Zeng, Jiwen, Huang, Huawei
openaire +1 more source
Certificateless Aggregate Signature Scheme
2010 International Conference on E-Business and E-Government, 2010This paper puts forward a secure construction of certificateless aggregate signature scheme using bilinear maps. The security of our scheme is based on the infeasibility of the Computational Diffie-Hellman problem and is formally proven in the strongest security model of certificateless aggregate signature schemes.
Chen Hu, Song Wangan, Zhao Bing
openaire +1 more source
Certificateless Concurrent Signature Scheme
2008 The 9th International Conference for Young Computer Scientists, 2008Certificateless public key cryptography was introduced to remove the use of certificate to ensure the authentication of the user's public key in the traditional certificate-based public key cryptography and overcome he key escrow problem in the identity-based public key cryptography.
Zhenjie Huang, Xuanzhi Lin, Rufen Huang
openaire +1 more source
Certificateless verifiably encrypted signature scheme
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content, 2010In this paper, we study the construction of verifiably encrypted signature in certificateless public key setting. We first present the notion and the new security model for certificateless verifiably encrypted signature (CLVES) and then present a concrete CLVES scheme based on Zhang's certificateless signature (CLS) [1], and provide the security ...
Bo Yang, Zibi Xiao, Shougui Li
openaire +1 more source
Practical certificateless short signature scheme
International Journal of Electronic Security and Digital Forensics, 2014Certificateless cryptography is an attractive paradigm for public key cryptography since it does not require certificates in traditional public key cryptography and also solves the inherent key escrow problem in identity-based cryptography. Currently, certificateless short signature is receiving significant attention from the public key cryptography ...
Miaomiao Tian, Liusheng Huang, Wei Yang
openaire +1 more source

