A survey of certificateless encryption schemes and security models

AW Dent - International Journal of Information Security, 2008 - Springer
This paper surveys the literature on certificateless encryption schemes. In particular, we
examine the large number of security models that have been proposed to prove the security …

Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT

Y Zhang, RH Deng, D Zheng, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …

Certificateless signcryption

M Barbosa, P Farshim - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
Certificateless cryptography inherits a solution to the certificate management problem in
public-key encryption from identity-based techniques, whilst removing the secret key escrow …

Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks

H Xiong, Z Qin - IEEE transactions on information forensics and …, 2015 - ieeexplore.ieee.org
To ensure the security and privacy of the patient's health status in the wireless body area
networks (WBANs), it is critical to secure the extra-body communication between the smart …

Certificateless signature revisited

X Huang, Y Mu, W Susilo, DS Wong, W Wu - Australasian Conference on …, 2007 - Springer
In this paper we revisit the security models of certificateless signatures and propose two new
constructions which are provably secure in the random oracle model. We divide the potential …

Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs

H Xiong, J Chen, Q Mei, Y Zhao - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing conditional anonymous authentication protocols to secure the group communication
in VANETs (Vehicular Ad hoc Networks) render challenges such as dynamically updating …

LiKe: Lightweight certificateless key agreement for secure IoT communications

P Tedeschi, S Sciancalepore, A Eliyan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against
the leakage of secret information stored on a trusted third party (TTP). These security …

Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks

J Liu, L Wang, Y Yu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Certificateless aggregate signature (CLAS) schemes reduce the trust on the key generation
center of identity-based signatures and thus partially address the inherent key escrow issue …

Efficient certificateless aggregate signature scheme for performing secure routing in VANETs

Z Xu, D He, N Kumar, KKR Choo - Security and …, 2020 - Wiley Online Library
Certificateless public key cryptosystem solves both the complex certificate management
problem in the public key cryptosystem based on the PKI and the key escrow issue in the …

Certificateless signcryption scheme in the standard model

Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …