Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks

Y Lu, J Li, Y Zhang - IEEE Transactions on Services Computing, 2019 - ieeexplore.ieee.org
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that
allows a user to perform keyword searches over publicly encrypted messages on an …

An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks

RM Daniel, EB Rajsingh, S Silas - Journal of Information Security and …, 2019 - Elsevier
Abstract Authenticated Key Agreement (AKA) protocol enables two communicating entities
to mutually establish a session key, in such a way that each entity is assured of the …

Revocable Signature Scheme with Implicit and Explicit Certificates

J Pejaś, T Hyla, W Zabierowski - Entropy, 2023 - mdpi.com
This paper addresses the certificate revocation problem and proposes the first revocable
pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA). We …

Demonstrably Secure Signature Scheme Resistant to -Traitor Collusion Attack

T Hyla, J Pejaś - IEEE Access, 2018 - ieeexplore.ieee.org
This paper presents the proposal of a new implicit and explicit certificate-based signature
scheme (IE-CBS-kCAA scheme) using Sakai-Kasahara's type keys. The scheme security …

Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography

L Zou, X Wang, L Deng - EAI Endorsed Transactions on Scalable …, 2021 - eudl.eu
In the traditional public key cryptosystem based on certificates, the issuance and
management of user certificates are realized through the authoritative certificate center, but …

Non-standard certification models for pairing based cryptography

T Hyla, J Pejaś - Hard and Soft Computing for Artificial Intelligence …, 2017 - Springer
Abstract In the traditional Public Key Infrastructure (PKI), a Certificate Authority (CA) issues a
digitally signed explicit certificate binding a user's identity and public key to achieve this …

A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack

T Hyla, J Pejaś - … Information Systems and Industrial Management: 16th …, 2017 - Springer
Abstract In 2002, Mitsunari, Sakai and Kasahara formulated the Collusion Attack Algorithm
with k traitors (known as k-CAA problem) and used it to develop the first traitor tracing …

Local and Outsourced Simultaneous Verification of Pairing-based Signatures

T Hyla - Journal of Internet Technology, 2019 - jit.ndhu.edu.tw
Many server-side applications require verifying a large number of digital signatures. In this
paper, a practical problem of simultaneous verification of a large number of signatures (up to …

[引用][C] 5G 超密集网络的认证方案综述

曹舒雅, 姚英英, 常晓林 - 网络空间安全, 2020