Results 1 to 10 of about 212,137 (199)

Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks [PDF]

open access: yesThe Scientific World Journal, 2014
Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of ...
Yang Lu, Jiguo Li
doaj   +3 more sources

A certificateless aggregate signature scheme for VANETs with privacy protection properties. [PDF]

open access: yesPLoS ONE
Aggregate signatures are excellent in simultaneously verifying the validity of multiple signatures, which renders them highly suitable for bandwidth-constrained environments.
Huimin Li   +3 more
doaj   +2 more sources

Public-Key replacement attacks on lightweight authentication schemes for resource-constrained scenarios

open access: yesCyber Security and Applications
Ensuring data integrity and data source trustworthiness during data sharing has always attracted the attention of researchers. Very recently, Zhu et al.
Fei Zhu   +4 more
doaj   +2 more sources

Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks

open access: yesElectronics, 2023
To achieve flexible sensing coverage with low deployment costs, mobile users need to contribute their equipment as sensors. Data integrity is one of the most fundamental security requirements and can be verified by digital signature techniques. In the mobile crowdsensing (MCS) environment, most sensors, such as smartphones, are resource-limited ...
Guilin Wang   +4 more
openaire   +1 more source

Forgery attacks on several certificateless signature schemes

open access: yes网络与信息安全学报, 2020
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003,a lot of certificateless signature schemes were proposed one after another.Recently,Tang et al proposed nine ...
Jing WANG, Zumeng LI
doaj   +3 more sources

A New Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs

open access: yesMathematics, 2023
Vehicular Ad Hoc Networks (VANETs) take moving vehicles and transport facilities as nodes to form mobile networks through wireless communication technology.
Beibei Yuan, Hui Huang, Chenhuang Wu
doaj   +1 more source

Cryptanalysis of Two Privacy-Preserving Authentication Schemes for Smart Healthcare Applications

open access: yesMathematics, 2023
Ensuring the secure sharing of privacy-sensitive healthcare data is attracting considerable interest from researchers. Recently, Ogundoyin et al. designed a lightweight privacy-preserving authentication scheme named PAASH for smart health applications ...
Feihong Xu, Junwei Luo, Rahman Ziaur
doaj   +1 more source

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments

open access: yesIEEE Access, 2018
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang   +3 more
doaj   +1 more source

Attacking a public key cryptosystem based on tree replacement

open access: yesDiscrete Applied Mathematics, 2007
We point out several security flaws in the cryptosystem based on tree replacement systems proposed by Samuel, Thomas, Abisha and Subramanian at INDOCRYPT 2002. Due to the success of (among others) very simple ciphertext-only attacks, we evidence that this system does not, in its present form, offer acceptable security guarantees for cryptographic ...
Vasco, María Isabel González   +1 more
openaire   +3 more sources

VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition [PDF]

open access: yes, 2018
Reliable facial expression recognition plays a critical role in human-machine interactions. However, most of the facial expression analysis methodologies proposed to date pay little or no attention to the protection of a user's privacy. In this paper, we
Chen, Jiawei   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy