Results 161 to 170 of about 1,921 (200)
Some of the next articles are maybe not open access.

An Efficient Certificateless Signature Scheme

2005
Traditional certificate based cryptosystem requires high maintenance cost for certificate management. Although, identity based cryptosystem reduces the overhead of certificate management, it suffers from the drawback of key escrow. Certificateless cryptosystem combines the advantages of both certificate based and identity based cryptosystems as it ...
M. Choudary Gorantla, Ashutosh Saxena
openaire   +1 more source

An efficient certificateless undeniable signature scheme

International Journal of Computer Mathematics, 2014
Certificateless cryptography addresses the private key escrow problem in identity-based systems, while overcoming the costly issues in traditional public key cryptography. Undeniable signature schemes were proposed with the aim of limiting the public verifiability of ordinary digital signatures. The first certificateless undeniable signature scheme was
Behnia, Rouzbeh   +2 more
openaire   +2 more sources

A new certificateless aggregate signature scheme

Computer Communications, 2009
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes.
Lei Zhang, Futai Zhang
openaire   +1 more source

An efficient certificateless ring signature scheme

Wuhan University Journal of Natural Sciences, 2008
To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signature scheme in this paper. Our construction is inspired by some efficient ID-based ring signature schemes, and uses bilinear pairings as a ...
Lijun Zhu, Futai Zhang
openaire   +1 more source

A certificateless proxy re-signature scheme

2010 3rd International Conference on Computer Science and Information Technology, 2010
Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the first certificateless proxy re-signature scheme.
null Guo Duntao   +3 more
openaire   +1 more source

Certificateless Signature Scheme without Random Oracles

2009
The only known construction of certificateless signature sche-mes that can be proven secure against a malicious Key Generation Center (KGC) requires the random oracle model to prove the security. In this paper, we present a certificateless signa ure scheme which is secure against malicious-but-passive KGC attack without random oracle.
Yumin Yuan   +3 more
openaire   +1 more source

Insecurity of a Certificateless Signature Scheme

2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2018
Certificateless signature scheme delivers the certificate problem and solve the key escrow problem inherit in the public key cryptography and identity based cryptography. Xiong et al suggested a certificateless aggregate signature scheme and proved that their CLS scheme is protected against all adversaries present in the network.
Pankaj Kumar, Vishnu Sharma
openaire   +1 more source

Efficient provable certificateless blind signature scheme

2010 International Conference on Networking, Sensing and Control (ICNSC), 2010
Certificateless public key cryptography is a new paradigm introduced by AI-Riyami and Paterson. It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in Identity-based Public Key Cryptography (ID-PKC).
Jianh Zhang, Shengnan Gao
openaire   +1 more source

Batch Verification for Certificateless Signature Schemes

2009 International Conference on Computational Intelligence and Security, 2009
Batch verification is a practical and significant technique which is very useful for greatly reducing the computational cost of verifying many signatures simultaneously. This technique is very attractive for authentications in computation-limited applications such as sensor network and banking service.
Manman Geng, Futai Zhang
openaire   +1 more source

An efficient certificateless aggregate signature scheme

Wuhan University Journal of Natural Sciences, 2017
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its ...
Baoyuan Kang, Mu Wang, Dongya Jing
openaire   +1 more source

Home - About - Disclaimer - Privacy