A provably secure certificateless public key encryption with keyword search

TY Wu, CM Chen, KH Wang, C Meng… - Journal of the Chinese …, 2019 - Taylor & Francis
Public key encryption with keyword search, known as PEKS, is a useful technology in some
Storage-as-a-Service clouds. This technology allows the cloud server to search on a …

An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature

K Li, MH Au, WH Ho, YL Wang - … 2019, Cairns, QLD, Australia, October 1 …, 2019 - Springer
Vehicular ad hoc networks (VANETs) are fundamental components of building a safe and
intelligent transportation system. However, due to its wireless nature, VANETs have serious …

An efficient proxy ring signature without bilinear pairing

Y Zhang, J ZENG - Chinese Journal of Electronics, 2019 - Wiley Online Library
Proxy ring signature is a proxy signature designed to protect the privacy of the proxy signer.
In this paper, we propose a new proxy ring signature based on the Schnorr's signature. Our …

[PDF][PDF] On the Security of a Certi ficateless Proxy Signature Scheme in the Standard Model.

C Zhou, X Dong, L Wang, T Li - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
Certificateless cryptosystem can overcome the costly certificate management in the
traditional public key cryptosystem, and meanwhile it does not have the private key escrow …

A new VRSA‐based pairing‐free certificateless signature scheme for fog computing

L Wang, M Wen, K Chen, Z Bi… - … and Computation: Practice …, 2019 - Wiley Online Library
Fog computing is composed of various computers with weak performance instead of servers
with strong performance. As history has shown, there has not been a general pairing‐free …

An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps

P Kumar, V Sharma, G Sharma… - International Journal of …, 2019 - igi-global.com
Certificateless signature schemes are a very intriguing aspect in information security
because of its capability of removing the well-known key escrow problem predominately in …