An optimal secure and reliable certificateless proxy signature for industrial internet of things

R Ullah, A Mehmood, MA Khan, C Maple… - Peer-to-Peer Networking …, 2024 - Springer
Abstract Certificateless Proxy Signature (CLPS) offers a comprehensive authentication
mechanism to ensure the optimal solutions from modern forgery attacks in Industrial Internet …

Secure and efficient certificate-based proxy signature schemes for industrial internet of things

Z Qiao, Y Zhou, B Yang, M Zhang… - IEEE Systems …, 2021 - ieeexplore.ieee.org
To improve the security of industrial Internet of things (IIoT), several concrete constructions of
certificate-based proxy signature (CBPS) scheme without bilinear pairing were proposed in …

An efficient and provable certificate-based proxy signature scheme for IIoT environment

GK Verma, BB Singh, N Kumar, MS Obaidat, D He… - Information …, 2020 - Elsevier
Recently, the deployment of sensors and actuators to collect and disseminate data in
various applications such as e-healthcare, vehicular adhoc networks (VANETs) and smart …

ECDLP‐based certificateless proxy signature scheme with message recovery

S Padhye, N Tiwari - Transactions on Emerging …, 2015 - Wiley Online Library
Certificateless public key cryptography (PKC) eliminates the use of certificates in traditional
PKC and the key escrow problem in identity‐based PKC. Up to now, a number of …

Efficient and secure certificateless key-insulated proxy signature scheme

M Palakollu, G Thumbur, PV Reddy - J. Math. Comput. Sci., 2024 - scik.org
A proxy signature scheme is a kind of digital signature which permits the original signer to
delegate his or her signing capabilities to a proxy signer who can sign on the original …

Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures

A Mehmood, MA Khan, C Maple… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The growing deployment of Industrial Internet of Things (IIoTs) raises significant
authentication concerns, especially in scenarios where resource-constrained devices need …

Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability

CL Hsu, TS Wu - Applied Mathematics and Computation, 2005 - Elsevier
In this paper, we propose a new (t, n) threshold proxy signature scheme, in which at least t
out of n proxy signers delegated by the original signer can sign messages on behalf of the …

A secure and efficient certificateless signature scheme for Internet of Things

D Xiang, X Li, J Gao, X Zhang - Ad Hoc Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a new technological innovation, which makes things
intelligent and our life more convenient. To ensure secure communication between smart …

An ecdlp-based threshold proxy signature scheme using self-certified public key system

Q Xue, F Li, Y Zhou, J Zhang, Z Cao, H Qian - … 2009, Turin, Italy, June 3-5 …, 2009 - Springer
In a (t, n) threshold proxy signature scheme, one original signer delegates a group of n proxy
signers to sign messages on behalf of the original signer. When the proxy signature is …

A secure encryption scheme based on certificateless proxy signature

K Sudharani, PNK Sakthivel - International Journal of …, 2018 - inderscienceonline.com
Certificateless public key cryptography (CL-PKC) scheme is introduced for solving the key
escrow problems in the identity-based cryptography and eliminate the use of security …