Certificateless remote anonymous authentication schemes for wirelessbody area networks

J Liu, Z Zhang, X Chen, KS Kwak - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Wireless body area network (WBAN) has been recognized as one of the promising wireless
sensor technologies for improving healthcare service, thanks to its capability of seamlessly …

A secure authentication scheme framework for mobile-sinks used in the internet of drones applications

YK Ever - Computer Communications, 2020 - Elsevier
Within the last decade, communication technologies have evolved rapidly, and this caused
significant advancements for Internet of Things (IoT) applications and services. Unmanned …

A provably secure certificateless public key encryption with keyword search

TY Wu, CM Chen, KH Wang, C Meng… - Journal of the Chinese …, 2019 - Taylor & Francis
Public key encryption with keyword search, known as PEKS, is a useful technology in some
Storage-as-a-Service clouds. This technology allows the cloud server to search on a …

Certificateless signature revisited

X Huang, Y Mu, W Susilo, DS Wong, W Wu - Australasian Conference on …, 2007 - Springer
In this paper we revisit the security models of certificateless signatures and propose two new
constructions which are provably secure in the random oracle model. We divide the potential …

EPAW: Efficient privacy preserving anonymous mutual authentication scheme for wireless body area networks (WBANs)

S Jegadeesan, M Azees, NR Babu… - IEEE …, 2020 - ieeexplore.ieee.org
The recent advancement in wireless body area networks (WBAN) plays an important role in
remote health care systems. However, these networks are suffering from data security and …

Malicious KGC attacks in certificateless cryptography

MH Au, Y Mu, J Chen, DS Wong, JK Liu… - Proceedings of the 2nd …, 2007 - dl.acm.org
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation
Center (KGC) always knows user secret key. If the KGC is malicious, it can always …

An efficient and provably‐secure certificateless signature scheme without bilinear pairings

D He, J Chen, R Zhang - International Journal of …, 2012 - Wiley Online Library
Certificateless public key cryptography simplifies the complex certificate management in the
traditional public key cryptography and resolves the key escrow problem in identitybased …

Efficient certificateless aggregate signature scheme for performing secure routing in VANETs

Z Xu, D He, N Kumar, KKR Choo - Security and …, 2020 - Wiley Online Library
Certificateless public key cryptosystem solves both the complex certificate management
problem in the public key cryptosystem based on the PKI and the key escrow issue in the …

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment

X Jia, D He, Q Liu, KKR Choo - Ad Hoc Networks, 2018 - Elsevier
With the growing popularity of Internet of Things (IoT) in a wide range of applications,
ensuring the communication security of IoT devices is important. Certificateless signature …

Efficient and provably-secure certificateless short signature scheme from bilinear pairings

H Du, Q Wen - Computer Standards & Interfaces, 2009 - Elsevier
Certificateless public key cryptography is a recently proposed attractive paradigm which
combines advantages of both certificate-based and ID-based public key cryptosystems as it …