Certificateless signcryption scheme in the standard model

Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …

Survey of information security

C Shen, HG Zhang, D Feng, ZF Cao… - Science in China Series F …, 2007 - Springer
The 21st century is the age of information when information becomes an important strategic
resource. The information obtaining, processing and security guarantee capability are …

[PDF][PDF] 无证书公钥密码体制研究

张福泰, 孙银霞, 张磊, 耿曼曼, 李素娟 - 软件学报, 2011 - jos.org.cn
无证书公钥密码体制研究 Page 1 软件学报ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscas.ac.cn
Journal of Software,2011,22(6):1316−1332 [doi: 10.3724/SP.J.1001.2011.04007] http://www.jos.org.cn …

Certificateless threshold ring signature

S Chang, DS Wong, Y Mu, Z Zhang - Information Sciences, 2009 - Elsevier
We propose a t-out-of-n Certificateless Threshold Ring Signature (CL-TRS) scheme and
prove its security under a new and stronger set of security models. The models capture a …

A multisecret sharing scheme for color images based on cellular automata

G Alvarez, LH Encinas, AM Del Rey - Information Sciences, 2008 - Elsevier
In this work a new multisecret sharing scheme for secret color images among a set of users
is proposed. The protocol allows that each participant in the scheme to share a secret color …

A survey on security of certificateless signature schemes

YC Chen, R Tso - IETE Technical Review, 2016 - Taylor & Francis
In cryptography, security models play important roles to define the security with potential
attacks. Following the security models, a scheme is analysed to be secure or insecure …

[HTML][HTML] Certificateless threshold signcryption scheme with secret sharing mechanism

H Yu, S Wang - Knowledge-Based Systems, 2021 - Elsevier
A (t, n) threshold signcryption scheme makes the distributor authorize a group with n
members, any t or more signcrypters can cooperatively use the signcryption keys to sign the …

: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks

X Dong, L Wei, H Zhu, Z Cao… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Service-oriented vehicular ad hoc networks (VANETs) are expected to support the diverse
infrastructure-based commercial services, including Internet access, real-time traffic …

Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments

B Zhang, T Zhu, C Hu, C Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes
can provide message authentication with no use of traditional digital certificates. High …

Certificateless undeniable signature scheme

S Duan - Information Sciences, 2008 - Elsevier
In this paper, we present the first certificateless undeniable signature scheme. The scheme
does not suffer from the key escrow problem, which is inherent in identity based …