Results 161 to 170 of about 1,931 (198)
Some of the next articles are maybe not open access.
A forward certificateless ring signature scheme
2011 International Conference on Multimedia Technology, 2011Certificateless public key cryptography reduces the difficult problem of key management in traditional public key cryptography, it also eliminates the key-escrow problem of identity-based cryptography and also preserves all of its advantages. A the lowest calculating time forward secure ring signature scheme is proposed, it can resist forgery attacks ...
null Xiangsheng Xia +2 more
openaire +1 more source
Certificateless universal designated verifier signature schemes
The Journal of China Universities of Posts and Telecommunications, 2007Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact.
Yang MING, Xiao-qin SHEN, Yu-min WANG
openaire +1 more source
An Efficient Certificateless Signature Scheme
2005Traditional certificate based cryptosystem requires high maintenance cost for certificate management. Although, identity based cryptosystem reduces the overhead of certificate management, it suffers from the drawback of key escrow. Certificateless cryptosystem combines the advantages of both certificate based and identity based cryptosystems as it ...
M. Choudary Gorantla, Ashutosh Saxena
openaire +1 more source
An efficient certificateless undeniable signature scheme
International Journal of Computer Mathematics, 2014Certificateless cryptography addresses the private key escrow problem in identity-based systems, while overcoming the costly issues in traditional public key cryptography. Undeniable signature schemes were proposed with the aim of limiting the public verifiability of ordinary digital signatures. The first certificateless undeniable signature scheme was
Behnia, Rouzbeh +2 more
openaire +2 more sources
An efficient certificateless ring signature scheme
Wuhan University Journal of Natural Sciences, 2008To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signature scheme in this paper. Our construction is inspired by some efficient ID-based ring signature schemes, and uses bilinear pairings as a ...
Lijun Zhu, Futai Zhang
openaire +1 more source
A certificateless proxy re-signature scheme
2010 3rd International Conference on Computer Science and Information Technology, 2010Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the first certificateless proxy re-signature scheme.
null Guo Duntao +3 more
openaire +1 more source
Certificateless Signature Scheme without Random Oracles
2009The only known construction of certificateless signature sche-mes that can be proven secure against a malicious Key Generation Center (KGC) requires the random oracle model to prove the security. In this paper, we present a certificateless signa ure scheme which is secure against malicious-but-passive KGC attack without random oracle.
Yumin Yuan +3 more
openaire +1 more source
Insecurity of a Certificateless Signature Scheme
2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2018Certificateless signature scheme delivers the certificate problem and solve the key escrow problem inherit in the public key cryptography and identity based cryptography. Xiong et al suggested a certificateless aggregate signature scheme and proved that their CLS scheme is protected against all adversaries present in the network.
Pankaj Kumar, Vishnu Sharma
openaire +1 more source
Efficient provable certificateless blind signature scheme
2010 International Conference on Networking, Sensing and Control (ICNSC), 2010Certificateless public key cryptography is a new paradigm introduced by AI-Riyami and Paterson. It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in Identity-based Public Key Cryptography (ID-PKC).
Jianh Zhang, Shengnan Gao
openaire +1 more source
Batch Verification for Certificateless Signature Schemes
2009 International Conference on Computational Intelligence and Security, 2009Batch verification is a practical and significant technique which is very useful for greatly reducing the computational cost of verifying many signatures simultaneously. This technique is very attractive for authentications in computation-limited applications such as sensor network and banking service.
Manman Geng, Futai Zhang
openaire +1 more source

