C Shen, HG Zhang, D Feng, ZF Cao… - Science in China Series F …, 2007 - Springer
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are …
We propose a t-out-of-n Certificateless Threshold Ring Signature (CL-TRS) scheme and prove its security under a new and stronger set of security models. The models capture a …
In this work a new multisecret sharing scheme for secret color images among a set of users is proposed. The protocol allows that each participant in the scheme to share a secret color …
YC Chen, R Tso - IETE Technical Review, 2016 - Taylor & Francis
In cryptography, security models play important roles to define the security with potential attacks. Following the security models, a scheme is analysed to be secure or insecure …
H Yu, S Wang - Knowledge-Based Systems, 2021 - Elsevier
A (t, n) threshold signcryption scheme makes the distributor authorize a group with n members, any t or more signcrypters can cooperatively use the signcryption keys to sign the …
X Dong, L Wei, H Zhu, Z Cao… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Service-oriented vehicular ad hoc networks (VANETs) are expected to support the diverse infrastructure-based commercial services, including Internet access, real-time traffic …
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates. High …
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based …