Results 171 to 180 of about 1,931 (198)
Some of the next articles are maybe not open access.
An efficient certificateless aggregate signature scheme
Wuhan University Journal of Natural Sciences, 2017Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its ...
Baoyuan Kang, Mu Wang, Dongya Jing
openaire +1 more source
Certificateless Convertible Limited Verifier Signature Scheme
TENCON 2006 - 2006 IEEE Region 10 Conference, 2006Certificateless Public Key Cryptography (CL-PKC) as a new paradigm was introduced by Al-Riyami and Paterson in Asiacrypt 2003, which removes the use of certificate to ensure the authenticity of the user's public key in the traditional certificate-based public key cryptography and also overcomes the key escrow problem in the identity-based public key ...
Chenhuang Wu, Zhenjie Huang
openaire +1 more source
Certificateless Ordered Sequential Aggregate Signature Scheme
2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011Ordered sequential aggregate signature scheme is a signature scheme in which each signer for a group signs an individual document, and guarantees both of the validity of the document and the signing order. Many ordered sequential aggregate signature schemes are ID-based scheme and inherit an intrinsic insider problem, called key escrow problem, of the ...
Naoto Yanai +3 more
openaire +1 more source
Novel Efficient Certificateless Blind Signature Schemes
2009 International Symposium on Computer Network and Multimedia Technology, 2009Recently, Al-Riyami and Paterson introduced a new and attractive paradigm named certificateless public key cryptography (CL-PKC), which avoids the key-escrow problem in identity-based cryptography (ID-PKC) and eliminates the expensive certificates used in the public key infrastructure (PKI).
Shifeng Sun, Qiaoyan Wen
openaire +1 more source
Forward Secure Certificateless Proxy Signature Scheme
2013In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy signature scheme, and propose the formal definition and security model of forward secure certificateless proxy signature. Furthermore, we present a construction of forward secure certificateless proxy signature scheme with bilinear maps.
Jiguo Li, Yanqiong Li, Yichen Zhang
openaire +1 more source
Efficient certificateless signature scheme
Journal of Computer Applications, 2010Dong-zhao HONG, Qi XIE
openaire +1 more source
Certificateless Homomorphism Network Coding Signature Scheme
IEEE Sensors Journal, 2022Huifang Yu, Jiafeng Shi
openaire +1 more source
A Practical Certificateless Signature Scheme
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), 2007Lifeng Guo, Lei Hu, Yong Li
openaire +1 more source
A Certificateless Partially Blind Signature Scheme
Software Engineering and Information Technology, 2015P.Z. Tang, J.F. Yang, Q.L. Zhang
openaire +1 more source
Certificateless aggregate signature scheme secure against fully chosen-key attacks
Information Sciences, 2020Ge Wu, Limin Shen, Fuchun Guo
exaly

