Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








261 Hits in 4.9 sec

Novel Efficient Certificateless Aggregate Signatures [chapter]

Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang
2009 Lecture Notes in Computer Science  
We propose a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography.  ...  The scheme is proven existentially unforgeable against adaptive chosen-message attacks under the standard computational Diffie-Hellman assumption.  ...  Subsequently, a new CLAS scheme was proposed in [10] and proven secure in a stronger security model.  ... 
doi:10.1007/978-3-642-02181-7_28 fatcat:74fngvfw5vht3kqjwhjwjux73a

On the Security of a Certi ficateless Proxy Signature Scheme in the Standard Model

Caixue Zhou, Xiwei Dong, Lihua Wang, Tao Li
2019 International Journal of Network Security  
In this paper, we show that a recently proposed certificateless proxy signature scheme in the standard model is vulnerable to the public key replacement attack.  ...  We analyse the reasons for the success of the attack and point out the flaw in the proof of the original scheme.  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China [grant numbers 61462048, 61562047 and 61662039]. We would like to present our thanks to Ms.  ... 
dblp:journals/ijnsec/ZhouDWL19 fatcat:gnsxw7vorrdklgky75myh2fpu4

On the Security of a RSA-based Certificateless Signature Scheme

Debiao He, Muhammad Khurram Khan, Shuhua Wu
2014 International Journal of Network Security  
s proposed the first RSA-based certificateless signature scheme and demonstrated that their scheme is provably secure in the random oracle model. In this paper, we will show that Zhang et al.'  ...  s scheme is insecure against a type I adversary who can replace users' public keys. The analysis shows Zhang et al.'s scheme is not secure for practical applications.  ...  Acknowledgments The authors thank Prof. Min-Shiang Hwang and the anonymous reviewers for their valuable comments.  ... 
dblp:journals/ijnsec/HeKW14 fatcat:mlxwfdabu5c4rkgw6w4pwxu4s4

Provably Secure Certificateless Proxy Signature Scheme in the Standard Model

Lunzhi Deng Lunzhi Deng, Zhenyu Hu Lunzhi Deng, Yu Ruan Zhenyu Hu, Tao Wang Yu Ruan
2022 Journal of Internet Technology  
The security proofs of most known schemes are given in the random oracle model (ROM). There are only two CLPS schemes with provably security in the standard model (SM).  ...  In this paper, a new CLPS scheme is constructed and the security proofs are showed in SM. The size of system parameters and the master key are constant in the scheme.  ...  , where ii R r P = Provably Secure Certificateless Proxy Signature Scheme in the Standard Model 281 t i The secret value of the th i user, where ii T t P = PK i = ( , ) i i R T The public key of the  ... 
doi:10.53106/160792642022032302008 fatcat:sdmu737mxrhphgiswroenagj5q

Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments [article]

Lunzhi Deng
2018 IACR Cryptology ePrint Archive  
Recently, Karati et al. presented a lightweight certificateless signature scheme for industrial Internet of Things (IIoT) environments, and claimed the scheme was provably secure in the standard model.  ...  In this paper, it is indicated that the scheme is not secure by showing two concrete attacks.  ...  However, A 1 does not know the new secret value of the user ID s . A 1 uses the difference between the new public key and the old public key to forge a signature. Case 2.  ... 
dblp:journals/iacr/Deng18 fatcat:mdrgtetypbchnoozyuqcgqqf7i

Online professional networking: An effective interactive tool

M. Yegani
2009 Poultry Science  
We introduce a new security model of certificate-based signature, which defines several new types of adversaries against certificate-based signatures, along with the security model of certificate-based  ...  Several new schemes and security models of certificate-based signatures have been proposed.  ...  New Security Models of Certificate-based Signatures A reasonable and elaborated security model is necessary for constructing provably secure cryptographic protocols.  ... 
doi:10.3382/ps.2009-00206 pmid:19687289 fatcat:qcme4usoxba7vdpnzijrmi77yi

Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage

Ms. K. Sudharani, Dr. N. K. Sakthivel
2021 International Journal of Engineering & Technology  
Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC.  ...  In the CL-PKC scheme, as the Key Generation Center (KGC) generates a public key using a partial secret key, the need for authenticating the public key by a trusted third party is avoided.  ...  The SE-CLPS scheme is used for securing the data in the cloud storage. The proposed scheme is provably secure in the standard model.  ... 
doi:10.14419/ijet.v10i1.21480 fatcat:ap2ie53znzajfomfer775vycia

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps

Chandrashekhar Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Adel R. Alharbi, Sarita Gajbhiye Meshram, Iqtadar Hussain
2022 IEEE Access  
In order to address this problem, a lightweight, provably secure certificateless technique that uses Fractional Chaotic Maps (FCM) for group-oriented signcryption (CGST) is proposed.  ...  INDEX TERMS Certificateless group signcryption scheme (CGSS), fractional chaotic maps (FCM), provably secure scheme, authentication, Diffie-Hellman (DH) problem, wireless security networks.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers of IEEE ACCESS for the critical comments which helped to improve the quality of this work.  ... 
doi:10.1109/access.2022.3165565 fatcat:6chqbpjowba3lmaiawrjtgxkry

Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network

Yu Zhan, Baocang Wang
2019 Security and Communication Networks  
Recently, a novel certificateless aggregate signature scheme was proposed by Kumar et al. This scheme's security was claimed to be secure against two types of attackers under the random oracle model.  ...  In this paper, we indicate that their scheme is unable to achieve this security goal.  ...  s Scheme In this section, we first review the security model of Kumar et al. 's schemes [10] . Security Model.  ... 
doi:10.1155/2019/6059834 fatcat:k5ybxo2jrbctjfeiogmi52z4ae

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC

Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang
2017 Security and Communication Networks  
Finally, we propose an improved strongly unforgeable CLS scheme in the standard model.  ...  In this paper, we firstly show that the scheme fails to achieve strong unforgeability by forging a new signature on a previously signed message under its adversarial model.  ...  Therefore, it is still an unresolved problem to construct a concrete CLS scheme provably secure against MKGC attacks in the standard model.  ... 
doi:10.1155/2017/5704865 fatcat:4revftdebfdxjnr7vak5vxn2ou

Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology

B.Banu priya, V. Sobhana, Mishmala Sushith
2015 IARJSET  
Dynamic Provable Data Possession (DPDP) to enlarge the PDP model is discussed in detail.  ...  In this paper we have made a concise survey on various privacy preserving techniques in cloud.  ...  The author used BLS signatures and secure in the random oracle model to build the first scheme. This scheme is used to let on public verifiability.  ... 
doi:10.17148/iarjset.2015.2206 fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq

A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications

Insaf Ullah, Noor Ul Amin, Mahdi Zareei, Asim Zeb, Hizbullah Khattak, Ajab Khan, Shidrokh Goudarzi
2019 Symmetry  
Moreover, our lightweight and secured scheme will attract low resource devices and will become a perk in the environment of IIoT.  ...  Here, we propose a lightweight certificateless signcryption approach for crowdsourced IIoT applications with the intention of enhancing security and decreasing the computational cost and communication  ...  A new standard model-based certificateless signcryption scheme was projected by Caixue et al [46] .  ... 
doi:10.3390/sym11111386 fatcat:247u6s3yk5bqfgdpu7nupbl7xi

Leakage-Resilient Certificateless Short Signature Scheme

Chen Xiaokui
2017 International Journal of Mechanical Engineering and Applications  
In this paper, we present a new leakage-resilient certificateless short signature scheme whose security is based on the classical decisional Diffie-Hellman (DDH) assumption.  ...  Besides these good performance features, we have formally proved the security of our scheme in the random oracle model under the hardness of the DDH problem.  ...  Acknowledgments The authors would like to thank the anonymous referees for their helpful comments.  ... 
doi:10.11648/j.ijmea.20170504.12 fatcat:tagilrizzvgjnjkntd7x2cviva

Constructing a pairing-free certificateless proxy signature scheme from ECDSA [article]

Cholun Kim
2021 IACR Cryptology ePrint Archive  
We then construct a pairing-free CLPS scheme from the standard ECDSA and prove its security in the random oracle model under the discrete semi-logarithm problem's hardness assumption as in the provable  ...  In this paper, we formalize the definition and security model of CLPS schemes.  ...  Motivated from above reasons, we focus on the security model for certificateless proxy signature (CLPS) schemes and provably secure schemes without pairings.  ... 
dblp:journals/iacr/Kim21b fatcat:vibs5kamyrg67cq6rkaz6y5gxe

Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security

Sumithra Alagarsamy, S. P. Rajagopalan
2017 International Journal of Computer Applications  
Due to the multiple message communication, the security is a most important concern in mobile network.  ...  The proposed EMV-CLSC technique provably improves the security with public key verifiability and cipher text authenticity.  ...  A new security model was designed in [6] to describe proxy signcryption scheme depends on the security model.  ... 
doi:10.5120/ijca2017915705 fatcat:4eqe6i6c7jcknas6d3wpimcvpa
« Previous Showing results 1 — 15 out of 261 results