Results 1 to 10 of about 212,137 (199)
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks [PDF]
Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of ...
Yang Lu, Jiguo Li
doaj +3 more sources
A certificateless aggregate signature scheme for VANETs with privacy protection properties. [PDF]
Aggregate signatures are excellent in simultaneously verifying the validity of multiple signatures, which renders them highly suitable for bandwidth-constrained environments.
Huimin Li +3 more
doaj +2 more sources
Ensuring data integrity and data source trustworthiness during data sharing has always attracted the attention of researchers. Very recently, Zhu et al.
Fei Zhu +4 more
doaj +2 more sources
To achieve flexible sensing coverage with low deployment costs, mobile users need to contribute their equipment as sensors. Data integrity is one of the most fundamental security requirements and can be verified by digital signature techniques. In the mobile crowdsensing (MCS) environment, most sensors, such as smartphones, are resource-limited ...
Guilin Wang +4 more
openaire +1 more source
Forgery attacks on several certificateless signature schemes
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003,a lot of certificateless signature schemes were proposed one after another.Recently,Tang et al proposed nine ...
Jing WANG, Zumeng LI
doaj +3 more sources
Vehicular Ad Hoc Networks (VANETs) take moving vehicles and transport facilities as nodes to form mobile networks through wireless communication technology.
Beibei Yuan, Hui Huang, Chenhuang Wu
doaj +1 more source
Cryptanalysis of Two Privacy-Preserving Authentication Schemes for Smart Healthcare Applications
Ensuring the secure sharing of privacy-sensitive healthcare data is attracting considerable interest from researchers. Recently, Ogundoyin et al. designed a lightweight privacy-preserving authentication scheme named PAASH for smart health applications ...
Feihong Xu, Junwei Luo, Rahman Ziaur
doaj +1 more source
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang +3 more
doaj +1 more source
Attacking a public key cryptosystem based on tree replacement
We point out several security flaws in the cryptosystem based on tree replacement systems proposed by Samuel, Thomas, Abisha and Subramanian at INDOCRYPT 2002. Due to the success of (among others) very simple ciphertext-only attacks, we evidence that this system does not, in its present form, offer acceptable security guarantees for cryptographic ...
Vasco, María Isabel González +1 more
openaire +3 more sources
VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition [PDF]
Reliable facial expression recognition plays a critical role in human-machine interactions. However, most of the facial expression analysis methodologies proposed to date pay little or no attention to the protection of a user's privacy. In this paper, we
Chen, Jiawei +2 more
core +1 more source

