Results 171 to 180 of about 1,931 (198)
Some of the next articles are maybe not open access.

An efficient certificateless aggregate signature scheme

Wuhan University Journal of Natural Sciences, 2017
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its ...
Baoyuan Kang, Mu Wang, Dongya Jing
openaire   +1 more source

Certificateless Convertible Limited Verifier Signature Scheme

TENCON 2006 - 2006 IEEE Region 10 Conference, 2006
Certificateless Public Key Cryptography (CL-PKC) as a new paradigm was introduced by Al-Riyami and Paterson in Asiacrypt 2003, which removes the use of certificate to ensure the authenticity of the user's public key in the traditional certificate-based public key cryptography and also overcomes the key escrow problem in the identity-based public key ...
Chenhuang Wu, Zhenjie Huang
openaire   +1 more source

Certificateless Ordered Sequential Aggregate Signature Scheme

2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011
Ordered sequential aggregate signature scheme is a signature scheme in which each signer for a group signs an individual document, and guarantees both of the validity of the document and the signing order. Many ordered sequential aggregate signature schemes are ID-based scheme and inherit an intrinsic insider problem, called key escrow problem, of the ...
Naoto Yanai   +3 more
openaire   +1 more source

Novel Efficient Certificateless Blind Signature Schemes

2009 International Symposium on Computer Network and Multimedia Technology, 2009
Recently, Al-Riyami and Paterson introduced a new and attractive paradigm named certificateless public key cryptography (CL-PKC), which avoids the key-escrow problem in identity-based cryptography (ID-PKC) and eliminates the expensive certificates used in the public key infrastructure (PKI).
Shifeng Sun, Qiaoyan Wen
openaire   +1 more source

Forward Secure Certificateless Proxy Signature Scheme

2013
In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy signature scheme, and propose the formal definition and security model of forward secure certificateless proxy signature. Furthermore, we present a construction of forward secure certificateless proxy signature scheme with bilinear maps.
Jiguo Li, Yanqiong Li, Yichen Zhang
openaire   +1 more source

Efficient certificateless signature scheme

Journal of Computer Applications, 2010
Dong-zhao HONG, Qi XIE
openaire   +1 more source

Certificateless Homomorphism Network Coding Signature Scheme

IEEE Sensors Journal, 2022
Huifang Yu, Jiafeng Shi
openaire   +1 more source

A Practical Certificateless Signature Scheme

The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), 2007
Lifeng Guo, Lei Hu, Yong Li
openaire   +1 more source

A Certificateless Partially Blind Signature Scheme

Software Engineering and Information Technology, 2015
P.Z. Tang, J.F. Yang, Q.L. Zhang
openaire   +1 more source

Certificateless aggregate signature scheme secure against fully chosen-key attacks

Information Sciences, 2020
Ge Wu, Limin Shen, Fuchun Guo
exaly  

Home - About - Disclaimer - Privacy