Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks
Y Lu, J Li, Y Zhang - IEEE Transactions on Services Computing, 2019 - ieeexplore.ieee.org
Searchable public key encryption (SPKE) is a useful public key cryptographic primitive that
allows a user to perform keyword searches over publicly encrypted messages on an …
allows a user to perform keyword searches over publicly encrypted messages on an …
An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks
Abstract Authenticated Key Agreement (AKA) protocol enables two communicating entities
to mutually establish a session key, in such a way that each entity is assured of the …
to mutually establish a session key, in such a way that each entity is assured of the …
Revocable Signature Scheme with Implicit and Explicit Certificates
This paper addresses the certificate revocation problem and proposes the first revocable
pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA). We …
pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA). We …
Demonstrably Secure Signature Scheme Resistant to -Traitor Collusion Attack
This paper presents the proposal of a new implicit and explicit certificate-based signature
scheme (IE-CBS-kCAA scheme) using Sakai-Kasahara's type keys. The scheme security …
scheme (IE-CBS-kCAA scheme) using Sakai-Kasahara's type keys. The scheme security …
Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography
L Zou, X Wang, L Deng - EAI Endorsed Transactions on Scalable …, 2021 - eudl.eu
In the traditional public key cryptosystem based on certificates, the issuance and
management of user certificates are realized through the authoritative certificate center, but …
management of user certificates are realized through the authoritative certificate center, but …
Non-standard certification models for pairing based cryptography
Abstract In the traditional Public Key Infrastructure (PKI), a Certificate Authority (CA) issues a
digitally signed explicit certificate binding a user's identity and public key to achieve this …
digitally signed explicit certificate binding a user's identity and public key to achieve this …
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack
Abstract In 2002, Mitsunari, Sakai and Kasahara formulated the Collusion Attack Algorithm
with k traitors (known as k-CAA problem) and used it to develop the first traitor tracing …
with k traitors (known as k-CAA problem) and used it to develop the first traitor tracing …
Local and Outsourced Simultaneous Verification of Pairing-based Signatures
T Hyla - Journal of Internet Technology, 2019 - jit.ndhu.edu.tw
Many server-side applications require verifying a large number of digital signatures. In this
paper, a practical problem of simultaneous verification of a large number of signatures (up to …
paper, a practical problem of simultaneous verification of a large number of signatures (up to …