Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
Certificateless signcryption scheme in the standard model
Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …
An efficient certificateless aggregate signature scheme for the Internet of Vehicles
In recent years, the research of Internet of vehicles (IoV) has received extensive attention. In
IoV, vehicles can make intelligent decisions by exchanging the real‐time traffic information …
IoV, vehicles can make intelligent decisions by exchanging the real‐time traffic information …
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
Mobile wallet, also known as mobile payment, is becoming one of the most frequently used
approach to provide payment services under financial regulation via mobile device and may …
approach to provide payment services under financial regulation via mobile device and may …
Forward-secure identity-based signature: security notions and construction
The security of traditional identity-based signatures wholly depends on the security of secret
keys. Exposure of secret keys requires reissuing all previously assigned signatures. This …
keys. Exposure of secret keys requires reissuing all previously assigned signatures. This …
Provable certificateless generalized signcryption scheme
C Zhou, W Zhou, X Dong - Designs, codes and cryptography, 2014 - Springer
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme
or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained …
or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained …
Improved certificateless signature scheme provably secure in the standard model
Certificateless cryptography shares many features of identity-based cryptography and
partially solves the problem of key escrow. Three certificateless signature schemes without …
partially solves the problem of key escrow. Three certificateless signature schemes without …
A new certificateless signature scheme provably secure in the standard model
KA Shim - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
Certificateless cryptography eliminates the need of certificates from public-key cryptography
and solves the key escrow problem in identity-based cryptography. Since Al-Riyami and …
and solves the key escrow problem in identity-based cryptography. Since Al-Riyami and …
On the security of an efficient and robust certificateless signature scheme for IIoT environments
W Yang, S Wang, X Huang, Y Mu - IEEE Access, 2019 - ieeexplore.ieee.org
As the progress of digitization in industrial society, large amount of production data are
outsourced to the cloud server in order to reduce data management costs. Nevertheless …
outsourced to the cloud server in order to reduce data management costs. Nevertheless …
Certificateless signcryption scheme without random oracles
C ZHOU - Chinese Journal of Electronics, 2018 - Wiley Online Library
Signcryption can realize encryption and signature simultaneously with lower computational
costs and communication overhead than those of the traditional sign‐then‐encrypt …
costs and communication overhead than those of the traditional sign‐then‐encrypt …