The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its security. The new scheme is proved secure against...
A telecare medicine information system (TMIS) for health-care delivery service requires information exchange among multiple IT systems, where different types of users with different access privileges are involved. In TMIS, users generally communicate via public channels. Hence, authentication is essential to provide access to the genuine users. However, access rights for the correct information and...
One of the most important benefits of public cloud storage is outsourcing of management and maintenance with easy accessibility and retrievability over the internet. However, outsourcing data on the cloud brings new challenges such as integrity verification and privacy of data. More concretely, once the users outsource their data on the cloud they have no longer physical control over the data and...
In this paper, the problem of establishing a shared session key in an authenticated way is addressed. New key agreement protocols that support explicit authentication are proposed. The protocols are designed in such a way that permits a trusted third party, such as a firewall, to verify the identities of the parties involved in a key agreement session. This is of course to reduce the computational...
The research of message certification in Vehicular Ad Hoc Networks (VANETs) has been focused on two aspects. One is the On Board Unit (OBU) certificates with Road Side Unit (RSU) one by one, and another is RSU goes to the batch certification after it collects a certain number of vehicle's messages. However, when the number of messages received by RSU is accumulated to certain extent, it is difficult...
An ID-based designed-verifier multisignature without trusted PKG is proposed. In proposed scheme, several signers cooperate to sign a single message and no one else than the designed verifier can be convinced by this signature. Since the scheme is based identity, it simplifies the certificate management. It is no need to trust PKG completely, so dishonest PKG can not be free to impersonate a user...
The sanitizable signature attracts much attention since it allows to modify the original document for hiding partial information with keeping the validity of the signature and the integrity of unmodified parts of the document. The sanitizable signature is quite useful in governmental or military offices where there is a dilemma between is closure laws for public documents and privacy or diplomatic...
In this paper, a user can login a certain system with a anonymous ID generated by Key Generate Center (KGC) and perform data signing operation. Other Members in the group, even KGC, can not reveal the real identity of the user from his anonymous ID. When doubt appears, the user can submit evidence information to KGC to prove his legality. The scheme is constructed from ID-based Blind Parameters Signature...
In SOK key distribution scheme, the shared key for safe channel can be generated without any interaction between two entities. But the shared key will be never update through life period of Key Generate Center (KGC) that cause more attacked risks. In this paper, we propose improved key distribution scheme and key update scheme to overcome the shortage of SOK scheme which are also non-interactive....
The direct anonymous attestation scheme was proposed by Brickell, Jan Camenisch, Liqun Chen and was adopted by the trusted computing group in its specifications for trusted computing platforms. In this paper, We propose a new direct anonymous scheme from the bilinear maps based on the decisional Diffie-Hellman assumption and q-SDH assumption. The length of private keys and signatures in our scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.