Results 141 to 150 of about 1,931 (198)
Security importance of edge-IoT ecosystem: An ECC-based authentication scheme. [PDF]
Alzahrani N.
europepmc +1 more source
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source
Privacy preservation in blockchain-based healthcare data sharing: A systematic review. [PDF]
Li K, Lohachab A, Dumontier M, Urovi V.
europepmc +1 more source
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A new certificateless aggregate signature scheme
Computer Communications, 2009Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes.
Lei Zhang, Futai Zhang
openaire +3 more sources
Certificateless undeniable signature scheme
Information Sciences, 2008zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +4 more sources
Efficient Certificateless Proxy Signature Scheme
International Journal of Foundations of Computer Science, 2016A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is ...
Deng, Lunzhi, Zeng, Jiwen, Huang, Huawei
openaire +1 more source
Certificateless Aggregate Signature Scheme
2010 International Conference on E-Business and E-Government, 2010This paper puts forward a secure construction of certificateless aggregate signature scheme using bilinear maps. The security of our scheme is based on the infeasibility of the Computational Diffie-Hellman problem and is formally proven in the strongest security model of certificateless aggregate signature schemes.
Chen Hu, Song Wangan, Zhao Bing
openaire +1 more source

