The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

A survey of certificateless encryption schemes and security models

AW Dent - International Journal of Information Security, 2008 - Springer
This paper surveys the literature on certificateless encryption schemes. In particular, we
examine the large number of security models that have been proposed to prove the security …

Certificateless searchable public key encryption scheme for industrial internet of things

M Ma, D He, N Kumar, KKR Choo… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the widespread adoption of Internet of Things and cloud computing in different industry
sectors, an increasing number of individuals or organizations are outsourcing their Industrial …

An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks

SJ Horng, SF Tzeng, PH Huang, X Wang, T Li… - Information …, 2015 - Elsevier
Certificateless public key cryptography was introduced to solve the complicated certificate
management problem in traditional public key cryptography and the key escrow problem in …

Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT

Y Zhang, RH Deng, D Zheng, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …

Certificateless signature revisited

X Huang, Y Mu, W Susilo, DS Wong, W Wu - Australasian Conference on …, 2007 - Springer
In this paper we revisit the security models of certificateless signatures and propose two new
constructions which are provably secure in the random oracle model. We divide the potential …

A new certificateless aggregate signature scheme

L Zhang, F Zhang - Computer Communications, 2009 - Elsevier
Aggregate signatures are useful in special areas where the signatures on many different
messages generated by many different users need to be compressed. In this paper, we …

Certificateless signcryption scheme in the standard model

Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …

Efficient certificateless aggregate signature scheme for performing secure routing in VANETs

Z Xu, D He, N Kumar, KKR Choo - Security and …, 2020 - Wiley Online Library
Certificateless public key cryptosystem solves both the complex certificate management
problem in the public key cryptosystem based on the PKI and the key escrow issue in the …

An efficient and privacy-preserving blockchain-based authentication scheme for low earth orbit satellite-assisted internet of things

B Wang, Z Chang, S Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, integrating satellite networks (eg, low-Earth-orbit (LEO) satellite constellation) into
the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more …