Filters








96 Hits in 7.1 sec

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT [article]

Rouzbeh Behnia, Attila A. Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen
2021 arXiv   pre-print
In this work, we propose new identity-based and certificateless cryptosystems that provide such compatibility and efficiency.  ...  Certificate-free cryptosystems, like identity-based and certificateless systems, lift the burden of certificates and could be a suitable alternative for such IoTs.  ...  This work is supported by the NSF CA-REER Award CNS-1917627, an unrestricted gift via Cisco Research Award and the Department of Energy Award DE-OE000078  ... 
arXiv:2103.09345v1 fatcat:ybmdo76c5zd7toc4s43khdhq5q

On Constructing Certificateless Cryptosystems from Identity Based Encryption [chapter]

Benoît Libert, Jean-Jacques Quisquater
2006 Lecture Notes in Computer Science  
Certificateless cryptography (CL-PKC) is a concept that aims at enjoying the advantages of identity based cryptography without suffering from its inherent key escrow.  ...  Several methods were recently suggested to generically construct a certificateless encryption (CLE) scheme by combining identity based schemes with ordinary public key cryptosystems.  ...  A subsequent work of Yum and Lee considered the relations between identity-based (IBE), certificate based (CBE) and certificateless encryption schemes (CLE) and established a result of essential equivalence  ... 
doi:10.1007/11745853_31 fatcat:h6q3gkqv5rfslhp7nki3dfqnl4

An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles

Insaf Ullah, Muhammad Asghar Khan, Mohammed H. Alsharif, Rosdiadee Nordin
2021 Sustainability  
The findings show that the proposed scheme promises better security and reduces the costs of computation and communication.  ...  ., only the sender knows the identities of the receivers.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su131910891 fatcat:njvedbhogvhzrcfnmrv22wkrre

A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+

Fei Li, Dongqing Xie, Wei Gao, Kefei Chen, Guilin Wang, Roberto Metere
2017 Journal of Ambient Intelligence and Humanized Computing  
That motivated the appearance of new technologies to replace the traditional PKI, such as the Identity based encryption, the certificateless encryption, etc.  ...  The new scheme employs the X509 certificate format and is free of the scalability and certificate management problems of the PKI.  ...  Hence, the interoperability between the traditional PKI system and this proposed HCL-PKC scheme will be easy because the two systems will be compatible.  ... 
doi:10.1007/s12652-017-0553-x fatcat:dcgmuuhkpjfurno2f7qgzbt6xy

Certified Encryption Revisited [chapter]

Pooya Farshim, Bogdan Warinschi
2009 Lecture Notes in Computer Science  
The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption.  ...  We show that an identity-based encryption scheme is secure if and only if it is secure when viewed as a certified encryption scheme.  ...  Acknowledgments The work carried out by the first author was supported in part by the Scientific and Technological Research Council of Turkey (TÜBİTAK) while at Middle East Technical University.  ... 
doi:10.1007/978-3-642-02384-2_12 fatcat:pvldcnkjqbeelgk7blm6iawhhq

Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption [chapter]

Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee
2010 Lecture Notes in Computer Science  
Moreover, the proposed scheme is unidirectional and compatible with current certificateless encryption deployments.  ...  In this paper we introduce the notion of certificateless proxy re-encryption and also give precise definitions for secure certificateless proxy re-encryption schemes.  ...  Acknowledgements This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD, Basic Research Promotion Fund) (KRF-2008-521-D00454).  ... 
doi:10.1007/978-3-642-13241-4_20 fatcat:zfilacfwp5c2rg4ksfcowfddk4

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps

Chandrashekhar Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Adel R. Alharbi, Sarita Gajbhiye Meshram, Iqtadar Hussain
2022 IEEE Access  
Compared with the essential combination of encryption and signature, the signcryption scheme has a more realistic solution for achieving message confidentiality and authentication simultaneously.  ...  However, the GM is allowed to reveal the identity of the signcrypter when there is a legal conflict to restrict repudiation of the signature.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers of IEEE ACCESS for the critical comments which helped to improve the quality of this work.  ... 
doi:10.1109/access.2022.3165565 fatcat:6chqbpjowba3lmaiawrjtgxkry

Certificateless Authenticated Two-Party Key Agreement Protocols [chapter]

Tarjei K. Mandt, Chik How Tan
2007 Lecture Notes in Computer Science  
Certificateless public key cryptography (CL-PKC) was proposed to overcome the weaknesses of the public key infrastructure (PKI) and identity-based cryptography (ID-PKC).  ...  Finally, we compare the protocol's efficiency to current identity-based and certificateless protocols. iii Certificateless Authenticated Two-Party Key Agreement Protocols Sammendrag Utfordringen i dag  ...  We have studied the concept of certificateless public key cryptography, as well as existing key agreement schemes (both identity-based and certificateless) and security models.  ... 
doi:10.1007/978-3-540-77505-8_4 fatcat:vxg4titcnnfytf742yn4lgrdc4

An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network

Muhammad Asghar Khan, Insaf Ullah, Shibli Nisar, Fazal Noor, Ijaz Mansoor Qureshi, Fahim Ullah Khanzada, Noor Ul Amin
2020 IEEE Access  
The scheme is based on the concept of Certificateless Public Key Cryptography (CL-PKC).  ...  In order to resolve the issue and to enable a secure communication between the UAVs and the Base Station (BS), we propose a Certificateless Key-Encapsulated Signcryption (CL-KESC) scheme.  ...  The scheme is characterized by employing a hierarchical identity-based broadcast encryption and pseudonym mechanism in which the devices can, anonymously, perform broadcasting of the encrypted messages  ... 
doi:10.1109/access.2020.2974381 fatcat:hfes5q465rcsrnrwrcgsadqjhm

Secure Automatic Identification System (SecAIS): Proof-of-Concept Implementation

Athanasios Goudosis, Sokratis Katsikas
2022 Journal of Marine Science and Engineering  
This paper reports on a proof-of-concept implementation of the SecAIS.  ...  Previous work has proposed an international maritime identity-based cryptographic infrastructure (mIBC) as the foundation upon which the offer of advanced security capabilities for the conventional AIS  ...  Identity-based encryption (IBE) schemes are certificateless public key cryptosystems that were originally proposed by Shamir in 1985 [32] .  ... 
doi:10.3390/jmse10060805 fatcat:2esunpjmazbxlkrf4pkvdju5f4

An ADS-B Message Authentication Method Based on Certificateless Short Signature

Zhijun Wu, Anxin Guo, Meng Yue, Liang Liu
2019 IEEE Transactions on Aerospace and Electronic Systems  
based on certificateless short signature.  ...  In view of the lowbandwidth and less-data-bit features of the ADS-B, this paper studies the integrity and authenticity of information by signing messages and proposes an ADS-B message authentication method  ...  However, compared schemes are based on identity encryption; the PKG can forge any aircraft's signatures, so it cannot offer true nonreputation.  ... 
doi:10.1109/taes.2019.2933957 fatcat:7cjdml2frzddpndyjix2d4uy2y

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies  ...  Recently, the integration of state-of-the-art technologies, such as modern sensors, networks, and cloud computing, has revolutionized the conventional healthcare system.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

Secure Techniques for Channel Encryption in Wireless Body Area Network without the Certificate

Chetna Monga, K. Srujan Raju, P. M. Arunkumar, Ankur Singh Bist, Girish Kumar Sharma, Hashem O. Alsaab, Baitullah Malakhil, Mohammad Farukh Hashmi
2022 Wireless Communications and Mobile Computing  
WBANs might benefit from certificateless signature encryption that uses a hyperelliptic curve and works over a secure channel. We are outpaced by the opposition by 4.58 milliseconds.  ...  Other factors influence an individual's genuine mobility and the ease with which they can use something. Participating in social networks may enhance the lives of members.  ...  Certificateless signcryption was utilised in [9, 10] ; signcryption is heterogeneous and not certificate-based. Problems with Crypto Hard Drive Classification of WBAN Encryption Schemes.  ... 
doi:10.1155/2022/2598465 fatcat:dctaaprmqnaxfjp5zymmzoxuam

Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks

Song Li, Jie Cui, Hong Zhong, Lu Liu
2017 Sensors  
Level 1 is an authentication only scheme, and Level 2 includes both authentication and simultaneous encryption to achieve the highest security goal in 802.15.6.  ...  To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection.  ...  With the property of certificateless encryption, the storage and bandwidth requirements of our proposed scheme are greatly reduced.  ... 
doi:10.3390/s17051032 pmid:28475110 pmcid:PMC5469637 fatcat:4nveq5sgzrahzjp3vv6ggevese

CBE from CL-PKE: A Generic Construction and Efficient Schemes [chapter]

Sattam S. Al-Riyami, Kenneth G. Paterson
2005 Lecture Notes in Computer Science  
These authors also considered a generic construction for CL-PKE from identity-based encryption (IBE) [10] and the relationships between IBE, CBE and CL-PKE [12] .  ...  In this paper, we revisit the work of [2] and [7], providing more efficient schemes and exploring the connections between the concepts of CBE and CL-PKE.  ...  We also make use of the schemes BasicPub and BasicPub hy from [4] , and we introduce two ElGamal-like schemes called ElG-BasicPub and ElG-HybridPub.  ... 
doi:10.1007/978-3-540-30580-4_27 fatcat:d7bj6mjwcfaknmcdhmhsbdxvvq
« Previous Showing results 1 — 15 out of 96 results