Results 11 to 20 of about 1,921 (200)
A New Certificateless Aggregate Signature Scheme [PDF]
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj +1 more source
A provably security and efficient certificateless short signature scheme [PDF]
In the certificateless cryptography system,there is no authentication relationship between the public key and the holder,which may cause a problem that a malicious user replaces the user’s public key.To This end,this paper improves the definition of ...
ZUO Liming,ZHOU Qing,CHEN Lanlan
doaj +1 more source
Forgery attacks on several certificateless signature schemes
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine
WANG Jing, LI Zumeng
doaj +3 more sources
A Revocable Certificateless Signature Scheme [PDF]
Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, how to revoke a user in certificateless cryptosystem still remains a problem: the existing solutions are not practical for use due to either a costly mediator or enormous computation (secret
Yinxia Sun, Futai Zhang, Limin Shen
openaire +1 more source
Revocable identity‐based matchmaking encryption in the standard model
RIB‐ME provides the features of data confidentiality, sender authenticity and efficient revocation, where the security can be reduced to static assumptions in the standard model. Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access ...
Zhe Jiang +5 more
wiley +1 more source
Efficient ID-based certificateless signature scheme
Using gap diffie-hellman (GDH) groups, an efficient ID-based certificateless signature scheme was proposed, which could solve the key escrow problem through binding two partially public keys with a same identity.
LIU Jing-wei, SUN Rong, MA Wen-ping
doaj +3 more sources
Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian +5 more
wiley +1 more source
A concrete certificateless signature scheme without pairings [PDF]
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core +2 more sources
Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi +21 more
wiley +1 more source
Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie +5 more
wiley +1 more source

