Results 151 to 160 of about 1,931 (198)
Some of the next articles are maybe not open access.

Certificateless Concurrent Signature Scheme

2008 The 9th International Conference for Young Computer Scientists, 2008
Certificateless public key cryptography was introduced to remove the use of certificate to ensure the authentication of the user's public key in the traditional certificate-based public key cryptography and overcome he key escrow problem in the identity-based public key cryptography.
Zhenjie Huang, Xuanzhi Lin, Rufen Huang
openaire   +1 more source

Certificateless verifiably encrypted signature scheme

2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content, 2010
In this paper, we study the construction of verifiably encrypted signature in certificateless public key setting. We first present the notion and the new security model for certificateless verifiably encrypted signature (CLVES) and then present a concrete CLVES scheme based on Zhang's certificateless signature (CLS) [1], and provide the security ...
Bo Yang, Zibi Xiao, Shougui Li
openaire   +1 more source

Practical certificateless short signature scheme

International Journal of Electronic Security and Digital Forensics, 2014
Certificateless cryptography is an attractive paradigm for public key cryptography since it does not require certificates in traditional public key cryptography and also solves the inherent key escrow problem in identity-based cryptography. Currently, certificateless short signature is receiving significant attention from the public key cryptography ...
Miaomiao Tian, Liusheng Huang, Wei Yang
openaire   +1 more source

Certificateless Designated Verifier Signature Schemes

20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2006
Designated verifier signature schemes allow a signer to convince a designated verifier, in such a way that only the designated verifier will believe with the authenticity of such a signature. The previous constructions of designated verifier signature rely on the underlying Public Key Infrastructure, that requires both signer and verifier to verify the
null Xinyi Huang   +3 more
openaire   +1 more source

Certificateless Directed Signature Scheme

2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011
In directed signature schemes, only a designated verifier can both verify the signature by himself, and also interact with a signer to prove the (in)validity of a given signature intended to him. In this paper, we propose the first certificateless directed signature scheme which is provably secure in the random oracle model.
openaire   +1 more source

Efficient Certificateless Signature Schemes

2007
Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity based cryptography, the notion of certificateless public key cryptography was introduced. In this paper, to construct an efficient certificateless signature (CLS) scheme, we present a new approach compactly and ...
Kyu Young Choi   +3 more
openaire   +1 more source

Secure mediated certificateless signature scheme

The Journal of China Universities of Posts and Telecommunications, 2007
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous ...
Chen YANG, Wen-ping MA, Xin-mei WANG
openaire   +1 more source

Certificateless Threshold Signature Schemes

2005
We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings.
Licheng Wang   +3 more
openaire   +1 more source

Certificateless aggregate signature schemes: A review

2016 International Conference on Computing, Communication and Automation (ICCCA), 2016
In the last decades security become a major issue due to increase technology. Among all the existing scheme certificateless aggregate schemes are very efficient techniques in recent scenario which is very helpful to provide security. Certificateless aggregate schemes are most attractive topic for researchers to give a lot of potential to secure our ...
Pankaj Kumar   +2 more
openaire   +1 more source

A Certificateless Proxy Blind Signature Scheme

2009 WRI World Congress on Software Engineering, 2009
Most of the proxy blind schemes are based on the identity or on certificate. In this paper, a new certificateless proxy blind signature scheme is presented. This scheme firstly avoids the inherent escrow of identity-based cryptography and then doesn’t require certificates to guarantee the authenticity of public keys. This scheme fulfills the properties
Yu Meisheng   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy