搜索结果: 1-11 共查到“密码学 certificateless signature”相关记录11条 . 查询时间(0.046 秒)
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
Certificateless cryptography Signature Bilinear pairing
font style='font-size:12px;'>
2018/11/20
Recently, Karati et al. presented a lightweight certificateless signature scheme for industrial Internet of Things (IIoT) environments, and claimed the scheme was provably secure in the standard model...
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
cryptographic protocols CLS
font style='font-size:12px;'>
2017/3/6
In these years, the design of certificateless signature (CLS) scheme without bilinear pairings has been thoroughly investigated owing to its effectiveness on solving the key escrow problem in identity...
A Revocable Online-Offline Certificateless Signature Scheme without Pairing
Tight security Random oracle
font style='font-size:12px;'>
2014/3/6
Certificateless Public key Cryptography is a widely studied paradigm due to its advantages of not having the key-escrow problem and the lack of use of certificates. Online-Offline signature schemes ar...
Deep Attacks of a Certificateless Signature Scheme
Cryptanalysis Bilinear Pairing
font style='font-size:12px;'>
2014/3/6
Certificateless public key cryptography is an attractive paradigm since it eliminates the use of certificates in traditional public key cryptography and alleviates the inherent key escrow problem in i...
A revocable certificateless signature scheme
public-key cryptography revocation certificateless signature
font style='font-size:12px;'>
2013/2/21
Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, membership revocation in certificate...
On the security models for certificateless signature schemes achieving level 3 security
public-key cryptography /certificateless public key cryptography certificateless signature Gi-rault's trust level level 3 security
font style='font-size:12px;'>
2012/3/23
key cryptography has found many applications in our modern society. To guarantee the authenticity of public keys, we need a trusted third party (TTP). In 1991, Girault defined three trust levels for a...
Efficient and provably-secure certificateless signature scheme without bilinear pairings
Certificateless public key cryptography Certificateless signature Bilinear pairings
font style='font-size:12px;'>
2010/12/14
Many certificateless signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multipl...
Key Replacement Attack on a Certificateless Signature Scheme
Certificateless signature key replacement attack bilinear pairing
font style='font-size:12px;'>
2009/1/6
Yap, Heng and Goi propose an efficient certificateless signature
scheme based on the intractability of the computational Diffie-
Hellman problem, and prove that the scheme is secure in the random or...
An attack on the certificateless signature scheme from EUC Workshops 2006
Signature scheme Certificateless PKC Public Key Cryptography
font style='font-size:12px;'>
2009/1/5
In this letter, we will show that the certificateless signature scheme recently proposed by Yap, Heng and Goi at EUC Workshops 2006 is insecure against a key replacement
attack. Our attack shows that...
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Self-Generated-Certificate Public Key Cryptography Certificateless Signature Encryption Scheme Standard Model
font style='font-size:12px;'>
2008/12/25
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of
Identity-Based Cryptography (IBC) while without having the problem of key escrow. However,
it does suffer to an attack...
An Attack on a Certificateless Signature Scheme
Certificateless public key signature replacement attack forgery
font style='font-size:12px;'>
2008/12/24
This paper demonstrates that a certificateless signature scheme
recently proposed by Gorantla and Saxena is insecure. It is shown that
an adversary who replaces the public key of a signer can then f...