Results 11 to 20 of about 1,921 (200)

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

A provably security and efficient certificateless short signature scheme [PDF]

open access: yesJisuanji gongcheng, 2019
In the certificateless cryptography system,there is no authentication relationship between the public key and the holder,which may cause a problem that a malicious user replaces the user’s public key.To This end,this paper improves the definition of ...
ZUO Liming,ZHOU Qing,CHEN Lanlan
doaj   +1 more source

Forgery attacks on several certificateless signature schemes

open access: yes网络与信息安全学报, 2020
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine
WANG Jing, LI Zumeng
doaj   +3 more sources

A Revocable Certificateless Signature Scheme [PDF]

open access: yesJournal of Computers, 2014
Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, how to revoke a user in certificateless cryptosystem still remains a problem: the existing solutions are not practical for use due to either a costly mediator or enormous computation (secret
Yinxia Sun, Futai Zhang, Limin Shen
openaire   +1 more source

Revocable identity‐based matchmaking encryption in the standard model

open access: yesIET Information Security, Volume 17, Issue 4, Page 567-581, July 2023., 2023
RIB‐ME provides the features of data confidentiality, sender authenticity and efficient revocation, where the security can be reduced to static assumptions in the standard model. Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access ...
Zhe Jiang   +5 more
wiley   +1 more source

Efficient ID-based certificateless signature scheme

open access: yesTongxin xuebao, 2008
Using gap diffie-hellman (GDH) groups, an efficient ID-based certificateless signature scheme was proposed, which could solve the key escrow problem through binding two partially public keys with a same identity.
LIU Jing-wei, SUN Rong, MA Wen-ping
doaj   +3 more sources

Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian   +5 more
wiley   +1 more source

A concrete certificateless signature scheme without pairings [PDF]

open access: yes, 2009
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core   +2 more sources

Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi   +21 more
wiley   +1 more source

Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy