A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA
english
2011
Proceedings of the International Conference on Security and Cryptography
unpublished
english
encryption scheme based on multiplicative groups (without bilinear pairing) by Sun et al. [18] and the RSA based CPA secure certificateless encryption scheme by Lai et al. [11]. ...
In this paper, we present two novel and completely different RSA based adaptive chosen ciphertext secure (CCA2) certificateless encryption schemes. ...
They have proved their scheme secure against chosen plaintext attack (CPA). In fact they left the design of a CCA secure system based on RSA as open. ...
doi:10.5220/0003529502080217
fatcat:2jcha4gudvdbblzcmvye3kl6ke
A Security-Mediated Encryption Scheme Based on ElGamal Variant
2021
Mathematics
In this paper, a pairing-free security mediated encryption scheme based on an ElGamal variant is proposed. ...
We show that the proposed security mediated encryption scheme is secure indistinguishably against chosen-ciphertext attack (IND-CCA) in the random oracle via the hardness assumption of the computational ...
In this paper, we propose a new security mediated encryption scheme based on an IND-CCA secure ElGamal variant. ...
doi:10.3390/math9212642
fatcat:yigaq2gmbfgtfoiqgegx3l3y6y
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN)
2020
Mobile Information Systems
To provide the previously mentioned services, this paper presents a certificateless proxy reencryption scheme (CPRES) based on the hyperelliptic curve for access control in the content-centric network ...
The simulation results show that the proposed scheme provides secure access to content during end-to-end communication. ...
[25] proposed another CL-PRE scheme in 2015 for data distributing in cloud and compared its security with CCA based on the strong security model. ...
doi:10.1155/2020/4138516
doaj:d87359eaa11f44dfb37ed31a83524b6f
fatcat:z6dt2zqvhnda5frzkgn7gkgn7u
Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things
2014
Mathematical Problems in Engineering
In this paper, we present a novel certificateless public key encryption scheme on the elliptic curve over the ring, whose security is based on the hardness assumption of Bilinear Diffie-Hellman problem ...
In addition, based on our encryption system, we also propose a protocol to protect the confidentiality and integrity of information in the scenario of Internet of Things with constrained resource nodes ...
's scheme [14] whose security is only based on the problem of factoring the large number as in RSA. ...
doi:10.1155/2014/980274
fatcat:6eucgdfumrddtmqn7kcrs7qzj4
Security-Mediated Certificateless Cryptography
[chapter]
2006
Lecture Notes in Computer Science
Our concrete scheme is more efficient than the identity-based mediated encryption scheme of Baek and Zheng in PKC 2004 which is provably secure in a comparable security model. ...
We present a generic construction and also a concrete algorithm based on bilinear pairings. ...
He is grateful to his coauthors for offering this on-going project, and anonymous reviewers for helpful comments and the suggestion about generic construction in particular. ...
doi:10.1007/11745853_33
fatcat:m2t7rq2zyvdtbp3hjd6cfw4riu
Fully Non-interactive Onion Routing with Forward-Secrecy
[chapter]
2011
Lecture Notes in Computer Science
Our solution is based on the application of forward-secure encryption. ...
We design a forward-secure encryption scheme (of independent interest) to be used as the main encryption scheme in an onion routing protocol. ...
Certificateless and PKI Variants The onion routing scheme we presented in Section 3, uses an identity-based forward-secure encryption for the routers. ...
doi:10.1007/978-3-642-21554-4_15
fatcat:jqh6slxzovhmxfyxd5wsh47upe
Fully non-interactive onion routing with forward secrecy
2012
International Journal of Information Security
Our solution is based on the application of forward-secure encryption. ...
We design a forward-secure encryption scheme (of independent interest) to be used as the main encryption scheme in an onion routing protocol. ...
Certificateless and PKI Variants The onion routing scheme we presented in Section 3, uses an identity-based forward-secure encryption for the routers. ...
doi:10.1007/s10207-012-0185-2
fatcat:5xurrrfsrjhsxc34wallnif6ee
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW
2020
Journal of Information and Communication Technology
On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. ...
For instance, symmetric encryption method provides a costeffective technique of securing data without compromising security. However, sharing the secret key is a vital problem. ...
Amandeep (2016) presented a new hybrid scheme based on Fibonacci series, XOR cipher, PN sequence, RSA, Hill cipher, one bit LSB, two bit LSB and three bit LSB. ...
doi:10.32890/jict2020.19.3.1
fatcat:dnur6fbzvve4jockrantiqwd5q
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication
2015
Mobile Information Systems
In this paper, we give new constructions ofPVPKEscheme based on signed quadratic residues and analyze their security. ...
Independently, we introduced a new cryptographic primitive, CCA-secure publicly verifiable public key encryption without pairings in the standard model (PVPKE), and discussed its application in proxy reencryption ...
based on signed quadratic residues is IND-CCA-secure. ...
doi:10.1155/2015/430797
fatcat:ptn2r6txrfhthluhw66z2cziba
Generic Constructions of Identity-Based and Certificateless KEMs
2007
Journal of Cryptology
We extend the concept of key encapsulation mechanisms to the primitives of ID-based and certificateless encryption. ...
We show that the natural combination of ID-KEMs or CL-KEMs with data encapsulation mechanisms results in encryption schemes which are secure in a strong sense. ...
Acknowledgements The authors would like to offer their thanks to Alex Dent and Kenny Paterson for providing detailed and insightful comments on an earlier version of this work. ...
doi:10.1007/s00145-007-9000-z
fatcat:7hw622oolrazdcgjyi46bq3cxa
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
2021
Security and Communication Networks
Upon evaluating the operational cost in real currency based on Ethereum, the experimental results demonstrate that the proposed scheme only requires a small cost as a fee. ...
The proposed provably secure signcryption scheme implements a designated recipient beforehand such that a sender can cryptographically facilitate the interoperation on the blockchain information with the ...
ECC-224) provides comparable security to RSA-3072 (resp. RSA-2048) [36] . ...
doi:10.1155/2021/6637402
fatcat:yo2yqkh4lbcenpug3aw223nxju
PRIVACY PRESERVING DATA ACCESS CONTROL USING PUBLIC KEY ENCRYPTION IN CLOUD
2015
International Journal on Information Sciences and Computing
Finally authorized users decrypt the same encrypted information from the public cloud. This technique has greater performance and security than the earlier one. ...
Cloud security is one of the most important ongoing research, technology of the day to day life where the information stored in the cloud must be restricted to the unauthorized users and also it can be ...
Thus the IND-CCA secure provides probabilistic polynomial time to solve the particular problem in the certificateless public key encryption scheme [9] . ...
doi:10.18000/ijisac.50149
fatcat:gtyadfjobnhz5ofqlgxmfkrvka
A survey of certificateless encryption schemes and security models
2008
International Journal of Information Security
scheme or an identity-based encryption scheme). ...
We also survey all known certificateless encryption schemes and point out that there are no known certificateless encryption schemes that achieve the highest levels of security without using the random ...
Acknowledgements The author is indebted to the provable security working group in ECRYPT's AZTEC lab for their help in discussing the topics of this paper. ...
doi:10.1007/s10207-008-0055-0
fatcat:5f26gjykwfex3bq7p2dfhp7hke
Efficient Certificateless Public Key Cryptography with Equality Test for Internet of Vehicles
2019
IEEE Access
In this scheme, the authorized cloud server has the permission to execute the equality test on encrypted data and retrieve the result without knowing any relevant information about the ciphertext. ...
Therefore, we assert that our scheme is ideal for deployment in both the cloud and IoV environments. INDEX TERMS Internet of Vehicles (IoV), cloud, certificateless, equality test. ...
Furthermore, we demonstrate the security of our scheme based on the OW-CCA and IND-CCA in the random oracle model assuming the mBDHI problem is intractable. ...
doi:10.1109/access.2019.2917326
fatcat:gicygksbqjcpzmvnmo6ckp3rpm
Provably secure certificateless encryption scheme in the standard model
2020
KSII Transactions on Internet and Information Systems
Recently, numerous certificateless encryption (CLE) schemes have been introduced. The security proofs of most schemes are given under the random oracle model (ROM). ...
Currently, there is only one scheme that was proved to be secure in SM. In this paper, we constructed a new CLE scheme and gave the security proofs in SM. ...
[20] put forward a common means to design CLE schemes with provably security in SM against CCAs, which come from a secure identity-based encryption scheme against chosen-plaintext attacks (CPAs). ...
doi:10.3837/tiis.2020.06.012
fatcat:a6arrplcz5fdzbuqjneb2xwffq
« Previous
Showing results 1 — 15 out of 70 results