Results 31 to 40 of about 1,931 (198)

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

SPATA: Strong Pseudonym based AuthenTicAtion in Intelligent Transport System [PDF]

open access: yes, 2018
Intelligent Transport System (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of ...
Ahmad, Naveed   +6 more
core   +1 more source

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

open access: yesIEEE Access, 2020
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj   +1 more source

A certificateless aggregate signature scheme for security and privacy protection in VANET

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi   +3 more
doaj   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

An Efficient Certificateless Signature Scheme [PDF]

open access: yes, 2006
Certificateless public key cryptography (CLPKC) is a paradi-gm to solve the inherent key escrow problem suffered by identity-based cryptography (IBC). While certificateless signature is one of the most important security primitives in CLPKC, there are relatively few proposed schemes in the literature.
Yap, Wun She   +2 more
openaire   +1 more source

Fail-Stop Ring Signature Scheme Based on Certificateless Cryptosystem [PDF]

open access: yesJisuanji gongcheng, 2020
Fail-stop group signature schemes can prevent opponents with strong compute power from counterfeiting signatures,and thereby implement privacy protection for users.On the basis of the fail-stop group signature scheme,this paper designs a fail-stop ring ...
ZHANG Yulei, SONG Tingting, ZHANG Yongjie, WANG Caifen
doaj   +1 more source

Cryptanalysis and improvement of an efficient certificateless signature scheme

open access: yes, 2008
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core   +1 more source

Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]

open access: yes, 2010
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core   +1 more source

Home - About - Disclaimer - Privacy