Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT

Y Zhang, RH Deng, D Zheng, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …

Certificateless signcryption scheme in the standard model

Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …

An efficient certificateless aggregate signature scheme for the Internet of Vehicles

Y Zhao, Y Hou, L Wang, S Kumari… - Transactions on …, 2020 - Wiley Online Library
In recent years, the research of Internet of vehicles (IoV) has received extensive attention. In
IoV, vehicles can make intelligent decisions by exchanging the real‐time traffic information …

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing

Z Qin, J Sun, A Wahaballa, W Zheng, H Xiong… - Computer Standards & …, 2017 - Elsevier
Mobile wallet, also known as mobile payment, is becoming one of the most frequently used
approach to provide payment services under financial regulation via mobile device and may …

Forward-secure identity-based signature: security notions and construction

J Yu, R Hao, F Kong, X Cheng, J Fan, Y Chen - Information Sciences, 2011 - Elsevier
The security of traditional identity-based signatures wholly depends on the security of secret
keys. Exposure of secret keys requires reissuing all previously assigned signatures. This …

Provable certificateless generalized signcryption scheme

C Zhou, W Zhou, X Dong - Designs, codes and cryptography, 2014 - Springer
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme
or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained …

Improved certificateless signature scheme provably secure in the standard model

Y Yu, Y Mu, G Wang, Q Xia, B Yang - IET Information Security, 2012 - IET
Certificateless cryptography shares many features of identity-based cryptography and
partially solves the problem of key escrow. Three certificateless signature schemes without …

A new certificateless signature scheme provably secure in the standard model

KA Shim - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
Certificateless cryptography eliminates the need of certificates from public-key cryptography
and solves the key escrow problem in identity-based cryptography. Since Al-Riyami and …

On the security of an efficient and robust certificateless signature scheme for IIoT environments

W Yang, S Wang, X Huang, Y Mu - IEEE Access, 2019 - ieeexplore.ieee.org
As the progress of digitization in industrial society, large amount of production data are
outsourced to the cloud server in order to reduce data management costs. Nevertheless …

Certificateless signcryption scheme without random oracles

C ZHOU - Chinese Journal of Electronics, 2018 - Wiley Online Library
Signcryption can realize encryption and signature simultaneously with lower computational
costs and communication overhead than those of the traditional sign‐then‐encrypt …