نتایج جستجو برای: certificateless signcryption scheme

تعداد نتایج: 222882  

Journal: :J. Systems Science & Complexity 2010
Piyi Yang Zhenfu Cao Xiaolei Dong

This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary separately. At the same time, the authors develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also p...

2016
Tej Singh Rashid Ali Musharraf Ali M. Mambo K. Usuda

Signcryption is a cryptography primitive that fulfills both the functions of digital signature and encryption and guarantees non-repudiation, confidentiality and integrity in a more efficient way. In this paper, we propose an efficient and secure identity based multi-proxy multi signcryption scheme from bilinear pairings. In this scheme a group of proxy signcrypters could authorize by a group o...

Journal: :I. J. Network Security 2016
Yan Xu Liusheng Huang Miaomiao Tian Hong Zhong

The ring signature scheme is a simplified group signature scheme for no manager while preserving unconditionally anonymous of the signer. Certificateless cryptography is introduced for eliminating the use of certificates in Public Key Infrastructure and solving the key-escrow problem in ID-based cryptogratography. Recently, Qin et al. proposed the first RSA-based certificateless ring signature ...

Journal: :Algebraic structures and their applications 2019

Journal: :IET Information Security 2012
Mahdi R. Alaghband Mohammad Reza Aref

With the development of the wireless communication technology and the sensor technology, the wireless sensor network (WSN) has been used in many applications. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. To achieve essentially secure communication in WSNs, a few of key management models have been proposed since it is the cruci...

Journal: :Computers & Security 2022

The proliferating adoption of the Internet Things (IoT) paradigm has fuelled need for more efficient and resilient access control solutions that aim to prevent unauthorized resource access. majority existing works in this field follow either a centralized approach (i.e. cloud-based) or an architecture where IoT devices are responsible all decision-making functions. Furthermore, resource-constra...

2009
Chun-I Fan Ruei-Hau Hsu Pei-Hsiu Ho

Certificateless signature scheme is a practical solution to confront the drawback, KGC being able to forge the signature of a user, of an identity based signature scheme. Lots of previous research results have shown the security models and the generic constructions for certificateless signatures. However, most of them did not satisfy Girault’s level-3 security which the conventional public key ...

2013
Hui Cui Yi Mu Man Ho Au

A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographic hardware device and observes the result of the cryptographic primitive under this modified private key. In this paper, we concentrate on the security of anonymous signcryption schemes under related-key attacks, in the sense that a signcryption system should contain no information that identifie...

Journal: :IEEE Access 2021

In the last decades, several signcryption schemes have been developed for different privacy-enhancing purposes. this paper, we propose a new group scheme that provides: unforgeability, confidentiality, ciphertext and sender anonymity, traceability, unlinkability, exculpability, coalition-resistance, unforgeable tracing verification. It is important to notice proposed allows signer anonymously s...

Journal: :Int. Arab J. Inf. Technol. 2013
Debiao He Jianhua Chen

To solve the key escrow problem in identity-based cryptosystem, Al-Riyami et al. introduced the CertificateLess Public Key Cryptography (CL-PKC). As an important cryptographic primitive, CertificateLess Designated Verifier Signature (CLDVS) scheme was studied widely. Following Al-Riyami et al. work, many certificateless Designated Verifier Signature (DVS) schemes using bilinear pairings have be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید