Abstract. Certificateless public key cryptography is an attractive paradigm since it eliminates the use of certificates in traditional public key cryptography and alleviates the inherent key escrow problem in identity-based cryptography. Recently, Xiong et al. proposed a certificateless signature scheme and proved that their scheme is existentially unforgeable against adaptive chosen message attack under the random oracle model. He et al. pointed out that Xiong et al.’s scheme is insecure against the Type II adversary. But, their forged signatures are not random, and their improved scheme has the same security defects as Xiong et al.’s scheme. In this paper, we present two malicious-but-passive KGC attack methods on Xiong et al.’s scheme an...
We present a study of security in certificateless signatures. We divide potential adversaries accord...
AbstractCertificateless public key cryptography simplifies the complex certificate management in the...
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and t...
Most of certificateless signature schemes without random oracles can not resist key replacement att...
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (...
In traditional digital signature schemes, certificates signed by a trusted party are required to ens...
Certificateless public key cryptography (CL-PKC) overcomes the difficulties of the certificate manag...
This paper demonstrates that a certificateless signature scheme recently proposed by Gorantla and S...
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected se-curity concern f...
Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certific...
Certificateless cryptography eliminates the need of certificacates in the public key crytosystems an...
The certificatless cryptography has been studied widely since it could eliminate the need of certifi...
Abstract. In this letter, we will show that the certificateless signature scheme recently pro-posed ...
In this paper we revisit the security models of certificateless signatures and propose two new const...
Certificateless cryptography overcomes the private key escrow problem in identity-based cryptography...
We present a study of security in certificateless signatures. We divide potential adversaries accord...
AbstractCertificateless public key cryptography simplifies the complex certificate management in the...
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and t...
Most of certificateless signature schemes without random oracles can not resist key replacement att...
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (...
In traditional digital signature schemes, certificates signed by a trusted party are required to ens...
Certificateless public key cryptography (CL-PKC) overcomes the difficulties of the certificate manag...
This paper demonstrates that a certificateless signature scheme recently proposed by Gorantla and S...
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected se-curity concern f...
Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certific...
Certificateless cryptography eliminates the need of certificacates in the public key crytosystems an...
The certificatless cryptography has been studied widely since it could eliminate the need of certifi...
Abstract. In this letter, we will show that the certificateless signature scheme recently pro-posed ...
In this paper we revisit the security models of certificateless signatures and propose two new const...
Certificateless cryptography overcomes the private key escrow problem in identity-based cryptography...
We present a study of security in certificateless signatures. We divide potential adversaries accord...
AbstractCertificateless public key cryptography simplifies the complex certificate management in the...
Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and t...