Certificateless network coding scheme from certificateless public auditing protocol
نویسندگان
چکیده
Abstract In recent years, network coding has received extensive attention and been applied to various computer systems, since it mathematically proven enhance the robustness maximize throughput. However, is well-known that extremely vulnerable pollution attacks. Certificateless scheme (CLNS) a recently proposed mechanism defend against attacks for coding, which avoids tedious management of certificates key-escrow attack. Until now, only few constructions were presented, more ones should be given so as enrich this field. paper, first time, we study general construction CLNS from certificateless public auditing protocol (CL-PAP), although two areas seem quite different in their nature are studied independently. Since there many candidates CL-PAPs, can naturally obtain abundant CLNSs according our systematic way. addition, order show power construction, also present concrete implementation specific CL-PAP. The performance analysis experimental results implemented competitive existing schemes.
منابع مشابه
Certificateless undeniable signature scheme
The concept of certificateless public key cryptography (CL-PKC) was introduced by Al-Riyami and Paterson. Such a cryptosystem does not suffer from the key escrow problem while avoiding the onerous management of certificates. In this paper, we present the first certificateless undeniable signature scheme. We consider two different types of adversaries and formalize the security notions for certi...
متن کاملEfficient Certificateless Signcryption Scheme
In this paper, we propose a certificateless signcryption scheme from Weil pairings and give a practical security model. Compared with existing schemes, the new scheme is more efficient.
متن کاملCertificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC).In contrast to traditional public key cryptographic systems, CL-PKC does not require theuse of certificates to guarantee the authenticity of public keys. It does rely on the useof a trusted third party (TTP) who is in possession of a master key. In these respects,CL-PKC is similar to identity-b...
متن کاملCertificateless threshold signature scheme from bilinear maps
A (t,n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with nmembers. In contrast to the traditional public key cryptography based on public key infrastructure (PKI) and identity-based public key cryptography (IDPKC), certificateless public key cryptography (CL-PKC) offers useful properties as it does not require any certificates to ensure ...
متن کاملCertificateless undeniable signature scheme q
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based cryptosystems. Also it can avoid the onerous management of certificates. Particularly, by using some cryptographic and mathematical techniques, we guarantee that the scheme’s two component protocols satisfy the properties of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Supercomputing
سال: 2022
ISSN: ['0920-8542', '1573-0484']
DOI: https://doi.org/10.1007/s11227-022-04719-6