搜索结果: 1-14 共查到“Efficient Certificateless”相关记录14条 . 查询时间(0.104 秒)
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing
Proxy Re-Encryption Pairing-less Public Key
font style='font-size:12px;'>
2017/8/16
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice ...
A Strong and Efficient Certificateless Digital Signature Scheme
certificateless signature certificateless public key
font style='font-size:12px;'>
2016/1/9
This paper extends the certificateless public key infrastructure model that was proposed by
Hassouna et al by proposing new digital signature scheme to provide true non-repudiation,
the proposed sig...
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
cryptographic protocols / Authentication Certificateless cryptography
font style='font-size:12px;'>
2013/2/21
Recently, He et al. (Computers and Mathematics with Applications, 2012, 64(6): 1914-1926) proposed a new efficient certificateless two-party authenticated key agreement protocol. They claimed their pr...
An efficient certificateless authenticated key agreement scheme
Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
font style='font-size:12px;'>
2012/3/26
Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the ...
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Certificateless cryptography Authenticated key agreement
font style='font-size:12px;'>
2011/7/25
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.
An efficient certificateless short signature scheme from pairings
public-key cryptography / Certificateless public key cryptography Shrot signature Bilinear pairings Provable security
font style='font-size:12px;'>
2012/3/29
To avoid the inherent key escrow problem in ID-based public key cryptosystem, Al-Riyami and Paterson introduced a new approach called certificateless public key cryptography. Recently, several short c...
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable
font style='font-size:12px;'>
2011/3/11
Key agreement (KA) allows two or more users to negotiate a secret
session key among them over an open network. Authenticated key agreement
(AKA) is a KA protocol enhanced to prevent active attacks. ...
An efficient certificateless two-party authenticated key agreement scheme from pairings
Certificateless cryptography Authenticated key agreement Provable security Bilinear pairings Elliptic curve
font style='font-size:12px;'>
2012/3/29
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AK...
Efficient Certificateless KEM in the Standard Model
Efficient Certificateless KEM Standard Model
font style='font-size:12px;'>
2009/9/27
We give a direct construction of a certificateless key encap-
sulation mechanism (KEM) in the standard model that is more ecient
than the generic constructions proposed before by Huang and Wong [9]...
Efficient Certificateless KEM in the Standard Model
Efficient Certificateless KEM Standard Model
font style='font-size:12px;'>
2009/9/22
We give a direct construction of a certificateless key encap-
sulation mechanism (KEM) in the standard model that is more efficient
than the generic constructions proposed before by Huang and Wong [...
Efficient Certificateless Signatures Suitable for Aggregation
Efficient Certificateless Signatures Aggregation
font style='font-size:12px;'>
2009/6/2
This technical report describes a novel certificateless signature scheme suitable for
aggregation that requires no pairing computations for signing and only 3 pairing computations
for signature veri...
Provable Efficient Certificateless Public Key Encryption
Provable Efficient Certificateless Public Key Encryption
font style='font-size:12px;'>
2009/2/26
Certificateless public key cryptography was introduced to
overcome the key escrow limitation of the identity-based cryptography.
It combines the advantages of the identity-based cryptography and the...
Efficient Certificateless Public Key Encryption
Public Key Encryption efficient scheme authenticated encryption
font style='font-size:12px;'>
2009/1/13
In [3] Al-Riyami and Paterson introduced the notion of "Cer-
tificateless Public Key Cryptography" and presented an instantiation.
In this paper, we revisit the formulation of certificateless publi...
Efficient Certificateless Signatures Suitable for Aggregation
Efficient Certificateless Signatures Aggregation
font style='font-size:12px;'>
2008/5/21
This technical report describes a novel certificateless signature scheme suitable for
aggregation that requires no pairing computations for signing and only 3 pairing computations
for signature veri...