409 Hits in 4.1 sec

An Efficient Certificateless Signature from Pairings

Changji Wang, Hui Huang, Yong Tang
2007 The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007)  
In this paper, we proposed a new certificateless signature scheme based on bilinear pairings.  ...  In this paper, we proposed a new certificateless signature scheme based on bilinear pairings.  ...  In this paper, we proposes a new certificateless signature scheme based on bilinear pairings.  ... 
doi:10.1109/isdpe.2007.15 fatcat:kygyup7dqrbmnhgsjxzrlhgbuq

A Pairing-free Certificateless Authenticated Group Key Agreement for Mobile Ad Hoc Network

Jun ZHENG, Jian-Dong YIN, Jin-Rong XUE, Yun-Long WANG
2017 DEStech Transactions on Computer Science and Engineering  
But most of these proposed protocols focused on security with bilinear pairing calculation, which is a computational-heavy operation.  ...  In this paper, a pairing-free certificateless authenticated group key agreement is proposed.  ...  Introduction Group key agreement is an effective method to secure group communication in mobile Ad Hoc network.  ... 
doi:10.12783/dtcse/aice-ncs2016/5686 fatcat:ullwjqm5cvaqldxed3hjrpl2li

Certificateless Hybrid Signcryption by a Novel Protocol Applied to Internet of Things

Wenzhan Zhang, Yanhui Zhang, Chong Guo, Qi An, Yuming Guo, Ximing Liu, Shijun Zhang, Junjia Huang, Konstantinos Demertzis
2022 Computational Intelligence and Neuroscience  
Therefore, to address the problem of data transmission in resource-constrained devices in IoT, we propose a new certificateless hybrid signcryption scheme for IoT.  ...  To prove that it satisfies the efficent transmission of IoT, we conduct simulation experiments, and the experimental results show that our proposed scheme has higher efficiency than the existing schemes  ...  [10] also proposed a certificateless signcryption scheme, which was based on the standard model and required five bilinear pairs of operations, and it was later noted to be insecure.  ... 
doi:10.1155/2022/3687332 pmid:35256876 pmcid:PMC8898137 fatcat:kkdr74f7prdkri3kkmwkwlwhfa

Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network

Yu Zhan, Baocang Wang
2019 Security and Communication Networks  
Certificateless aggregate signatures aggregate n signatures from n different users into one signature. Therefore, a verifier can judge whether all signatures are valid by verifying once.  ...  Recently, a novel certificateless aggregate signature scheme was proposed by Kumar et al. This scheme's security was claimed to be secure against two types of attackers under the random oracle model.  ...  Recently, Kumar et al. proposed a novel certificateless signature scheme with bilinear pairing. Furthermore, they extended the CLS scheme to a CL-AS scheme [10] .  ... 
doi:10.1155/2019/6059834 fatcat:k5ybxo2jrbctjfeiogmi52z4ae

Security analysis and improvement of the certificateless aggregate signature schemes

Aiwan Fan, Qiming Wang
2017 Advances in Modelling and Analysis B  
For most aggregate signature schemes based on the traditional cryptography, key escrow is very complicated, while for identity-based aggregate signature schemes, there is a problem with certificate management  ...  The certificateless public key cryptosystem can effectively solve these two drawbacks, but most certificateless aggregate signature schemes are of low computation efficiency and have security problems.  ...  [2] proposed an sequential aggregate scheme based on the trapdoor permutation theory. Based on [1] , [3] proposed a new aggregate signature security model.  ... 
doi:10.18280/ama_b.600111 fatcat:k7lbsjjebnewrg3x5lsn2k5eie

Certificateless Proxy Signature from RSA

Lunzhi Deng, Jiwen Zeng, Yunyun Qu
2014 Mathematical Problems in Engineering  
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.  ...  We propose a certificateless proxy signature (CLPS) scheme from RSA and prove its security under the strongest security model where the Type I/II adversary is a super Type I/II adversary.  ...  All the above schemes are very practical, but they are based on bilinear pairings and the pairing is regarded as the most expensive cryptography primitive.  ... 
doi:10.1155/2014/373690 fatcat:b6oa26hs3bftnihn2l3xhgrdqe

An Efficient Certificateless Aggregate Signature Scheme for Blockchain-Based Medical Cyber Physical Systems

Hong Shu, Ping Qi, Yongqing Huang, Fulong Chen, Dong Xie, Liping Sun
2020 Sensors  
Based on the proposed multi-trapdoor hash function, we present a certificateless aggregate signature scheme for blockchain-based MCPS.  ...  Certificateless aggregation signature schemes can greatly tackle the difficulty of blockchain expansion.  ...  Pairing-based aggregate signature schemes can be simulated on the bilinear pairing e : G 1 × G 1 → G 2 .  ... 
doi:10.3390/s20051521 pmid:32164220 fatcat:5obgaekcbvbmveg4da4fllvvje

A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems

Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu
2008 2008 The 28th International Conference on Distributed Computing Systems Workshops  
In this paper, we propose an efficient certificateless signature scheme for mobile wireless cyberphysical systems (McCLS) based on the bilinear Diffie-Hellman assumption.  ...  Recently, several secure signature schemes for MANETs have been proposed based on public key cryptography and identity-based cryptography.  ...  Conclusion An efficient certificateless signature scheme named Mc-CLS based on the bilinear Diffie-Hellman assumption in the random oracle model for mobile wireless cyber-physical systems is proposed in  ... 
doi:10.1109/icdcs.workshops.2008.84 dblp:conf/icdcsw/XuLZHDS08 fatcat:syeksgwz65hlpg2ina3to6julm

Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography

Lina Zou, Xueying Wang, Lifeng Deng
2021 EAI Endorsed Transactions on Scalable Information Systems  
In reference [9], a bilinear pair was used to construct a shortsignature scheme in the army conference, which was the shortest short-signature scheme in the classical password.  ...  Therefore, this paper proposes a certificateless short signature scheme based on integrated neural networks and elliptic curve cryptography for secure data fusion analysis.  ...  Wang [17] proposed an efficient certificateless short signature scheme based on bilinear pairings, and gave the security proof of the scheme.  ... 
doi:10.4108/eai.14-9-2021.170952 fatcat:itvwftyngzfx5h2xepgk4zrlm4

An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature

Yuanpan Zheng, Guangyu Chen, Liguan Guo
2020 Complexity  
Based on the certificateless cryptosystem and group signature ideas, this paper proposes a certificateless group signature anonymous authentication scheme for the VANETs of a smart city.  ...  From the proofs of correctness and security, we know that it does not only has anonymity and traceability of the group signature scheme but also has unforgeability and forward security.  ...  Establishment of an Anonymous Authentication Scheme Based on Certificateless Group Signature Design Idea.  ... 
doi:10.1155/2020/1378202 fatcat:zmudoakpc5ejnjpnqilsvqajv4

On the Security of Certificateless Signature Schemes

Gaurav Sharma, Suman Bala, Anil K. Verma
2013 International Journal of Distributed Sensor Networks  
Recently, Tsai et al. proposed an improved certificateless signature scheme without pairing and claimed that their new construction is secure against different kinds of attacks.  ...  Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography  ...  [11] proposed an efficient CLS scheme which required only two bilinear pairings.  ... 
doi:10.1155/2013/102508 fatcat:dw4h6g7qrjbb3gfxwuymrgiasm

An Online-Offline Certificateless Signature Scheme for Internet of Health Things

Muhammad Asghar Khan, Sajjad Ur Rehman, M. Irfan Uddin, Shibli Nisar, Fazal Noor, Ali Alzahrani, Insaf Ullah, Shah Nazir
2020 Journal of Healthcare Engineering  
We strive to resolve such a deficiency, and thus a new scheme has been proposed in this article, called an online-offline signature scheme in certificateless settings.  ...  The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which plays an important role in the remote sharing of data from various physical processes such as patient monitoring  ...  [27] also proposed an offline-online signature scheme called the MHCOOS for M-Health devices based on bilinear pairing.  ... 
doi:10.1155/2020/6654063 pmid:33489059 pmcid:PMC7790548 fatcat:2baaf5dtxnetbih6beni5jxwjy

Online professional networking: An effective interactive tool

M. Yegani
2009 Poultry Science  
Based on our generic construction, we are able to construct new certificate-based signature schemes, which are more efficient in comparison with other schemes with similar security levels.  ...  We then investigate the relationship between certificate-based signatures and certificateless signatures, and propose a generic construction of certificate-based signatures.  ...  Scheme II The scheme described in this section is based on the certificateless signature scheme in Section 4.3 of ].  ... 
doi:10.3382/ps.2009-00206 pmid:19687289 fatcat:qcme4usoxba7vdpnzijrmi77yi

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

Kuo-Hui Yeh, Chunhua Su, Kim-Kwang Raymond Choo, Wayne Chiu
2017 Sensors  
In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments.  ...  The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.  ...  [33] presented a bilinear pairing-based certificateless signature scheme and proved its security in the standard model.  ... 
doi:10.3390/s17051001 pmid:28468313 pmcid:PMC5469524 fatcat:eytr5y5gaja4bkoqwchi3337ki

Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography

Arpita Sarkar
2012 International journal of network security and its applications  
The basic idea of CL-PKC is to generate a public/private key pair for a user by using a master key of a Key Generation Center (KGC) with a random secret value selected by the user.  ...  with certificate management, including renew, revocation ,storage and distribution and the computational cost of certificate verification, also the chain of verification can be quite long, depending on  ...  (This logic is similar to that of an identity-based encryption scheme.)  ... 
doi:10.5121/ijnsa.2012.4612 fatcat:uv4b3rb2r5g5zdep3p27vi7vem
« Previous Showing results 1 — 15 out of 409 results