A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Novel Efficient Certificateless Aggregate Signatures
[chapter]
2009
Lecture Notes in Computer Science
We propose a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography. ...
The scheme is proven existentially unforgeable against adaptive chosen-message attacks under the standard computational Diffie-Hellman assumption. ...
Subsequently, a new CLAS scheme was proposed in [10] and proven secure in a stronger security model. ...
doi:10.1007/978-3-642-02181-7_28
fatcat:74fngvfw5vht3kqjwhjwjux73a
On the Security of a Certi ficateless Proxy Signature Scheme in the Standard Model
2019
International Journal of Network Security
In this paper, we show that a recently proposed certificateless proxy signature scheme in the standard model is vulnerable to the public key replacement attack. ...
We analyse the reasons for the success of the attack and point out the flaw in the proof of the original scheme. ...
Acknowledgments This work was supported by the National Natural Science Foundation of China [grant numbers 61462048, 61562047 and 61662039]. We would like to present our thanks to Ms. ...
dblp:journals/ijnsec/ZhouDWL19
fatcat:gnsxw7vorrdklgky75myh2fpu4
On the Security of a RSA-based Certificateless Signature Scheme
2014
International Journal of Network Security
s proposed the first RSA-based certificateless signature scheme and demonstrated that their scheme is provably secure in the random oracle model. In this paper, we will show that Zhang et al.' ...
s scheme is insecure against a type I adversary who can replace users' public keys. The analysis shows Zhang et al.'s scheme is not secure for practical applications. ...
Acknowledgments The authors thank Prof. Min-Shiang Hwang and the anonymous reviewers for their valuable comments. ...
dblp:journals/ijnsec/HeKW14
fatcat:mlxwfdabu5c4rkgw6w4pwxu4s4
Provably Secure Certificateless Proxy Signature Scheme in the Standard Model
2022
Journal of Internet Technology
The security proofs of most known schemes are given in the random oracle model (ROM). There are only two CLPS schemes with provably security in the standard model (SM). ...
In this paper, a new CLPS scheme is constructed and the security proofs are showed in SM. The size of system parameters and the master key are constant in the scheme. ...
, where ii R r P =
Provably Secure Certificateless Proxy Signature Scheme in the Standard Model 281 t i The secret value of the th i user, where ii T t P = PK i = ( , ) i i R T The public key of the ...
doi:10.53106/160792642022032302008
fatcat:sdmu737mxrhphgiswroenagj5q
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
[article]
2018
IACR Cryptology ePrint Archive
Recently, Karati et al. presented a lightweight certificateless signature scheme for industrial Internet of Things (IIoT) environments, and claimed the scheme was provably secure in the standard model. ...
In this paper, it is indicated that the scheme is not secure by showing two concrete attacks. ...
However, A 1 does not know the new secret value of the user ID s . A 1 uses the difference between the new public key and the old public key to forge a signature. Case 2. ...
dblp:journals/iacr/Deng18
fatcat:mdrgtetypbchnoozyuqcgqqf7i
Online professional networking: An effective interactive tool
2009
Poultry Science
We introduce a new security model of certificate-based signature, which defines several new types of adversaries against certificate-based signatures, along with the security model of certificate-based ...
Several new schemes and security models of certificate-based signatures have been proposed. ...
New Security Models of Certificate-based Signatures A reasonable and elaborated security model is necessary for constructing provably secure cryptographic protocols. ...
doi:10.3382/ps.2009-00206
pmid:19687289
fatcat:qcme4usoxba7vdpnzijrmi77yi
Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage
2021
International Journal of Engineering & Technology
Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. ...
In the CL-PKC scheme, as the Key Generation Center (KGC) generates a public key using a partial secret key, the need for authenticating the public key by a trusted third party is avoided. ...
The SE-CLPS scheme is used for securing the data in the cloud storage. The proposed scheme is provably secure in the standard model. ...
doi:10.14419/ijet.v10i1.21480
fatcat:ap2ie53znzajfomfer775vycia
CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps
2022
IEEE Access
In order to address this problem, a lightweight, provably secure certificateless technique that uses Fractional Chaotic Maps (FCM) for group-oriented signcryption (CGST) is proposed. ...
INDEX TERMS Certificateless group signcryption scheme (CGSS), fractional chaotic maps (FCM), provably secure scheme, authentication, Diffie-Hellman (DH) problem, wireless security networks. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers of IEEE ACCESS for the critical comments which helped to improve the quality of this work. ...
doi:10.1109/access.2022.3165565
fatcat:6chqbpjowba3lmaiawrjtgxkry
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network
2019
Security and Communication Networks
Recently, a novel certificateless aggregate signature scheme was proposed by Kumar et al. This scheme's security was claimed to be secure against two types of attackers under the random oracle model. ...
In this paper, we indicate that their scheme is unable to achieve this security goal. ...
s Scheme In this section, we first review the security model of Kumar et al. 's schemes [10] .
Security Model. ...
doi:10.1155/2019/6059834
fatcat:k5ybxo2jrbctjfeiogmi52z4ae
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
2017
Security and Communication Networks
Finally, we propose an improved strongly unforgeable CLS scheme in the standard model. ...
In this paper, we firstly show that the scheme fails to achieve strong unforgeability by forging a new signature on a previously signed message under its adversarial model. ...
Therefore, it is still an unresolved problem to construct a concrete CLS scheme provably secure against MKGC attacks in the standard model. ...
doi:10.1155/2017/5704865
fatcat:4revftdebfdxjnr7vak5vxn2ou
Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology
2015
IARJSET
IARJSET - Science, Engineering and Technology
Dynamic Provable Data Possession (DPDP) to enlarge the PDP model is discussed in detail. ...
In this paper we have made a concise survey on various privacy preserving techniques in cloud. ...
The author used BLS signatures and secure in the random oracle model to build the first scheme. This scheme is used to let on public verifiability. ...
doi:10.17148/iarjset.2015.2206
fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq
A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications
2019
Symmetry
Moreover, our lightweight and secured scheme will attract low resource devices and will become a perk in the environment of IIoT. ...
Here, we propose a lightweight certificateless signcryption approach for crowdsourced IIoT applications with the intention of enhancing security and decreasing the computational cost and communication ...
A new standard model-based certificateless signcryption scheme was projected by Caixue et al [46] . ...
doi:10.3390/sym11111386
fatcat:247u6s3yk5bqfgdpu7nupbl7xi
Leakage-Resilient Certificateless Short Signature Scheme
2017
International Journal of Mechanical Engineering and Applications
In this paper, we present a new leakage-resilient certificateless short signature scheme whose security is based on the classical decisional Diffie-Hellman (DDH) assumption. ...
Besides these good performance features, we have formally proved the security of our scheme in the random oracle model under the hardness of the DDH problem. ...
Acknowledgments The authors would like to thank the anonymous referees for their helpful comments. ...
doi:10.11648/j.ijmea.20170504.12
fatcat:tagilrizzvgjnjkntd7x2cviva
Constructing a pairing-free certificateless proxy signature scheme from ECDSA
[article]
2021
IACR Cryptology ePrint Archive
We then construct a pairing-free CLPS scheme from the standard ECDSA and prove its security in the random oracle model under the discrete semi-logarithm problem's hardness assumption as in the provable ...
In this paper, we formalize the definition and security model of CLPS schemes. ...
Motivated from above reasons, we focus on the security model for certificateless proxy signature (CLPS) schemes and provably secure schemes without pairings. ...
dblp:journals/iacr/Kim21b
fatcat:vibs5kamyrg67cq6rkaz6y5gxe
Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security
2017
International Journal of Computer Applications
Due to the multiple message communication, the security is a most important concern in mobile network. ...
The proposed EMV-CLSC technique provably improves the security with public key verifiability and cipher text authenticity. ...
A new security model was designed in [6] to describe proxy signcryption scheme depends on the security model. ...
doi:10.5120/ijca2017915705
fatcat:4eqe6i6c7jcknas6d3wpimcvpa
« Previous
Showing results 1 — 15 out of 261 results