Strong designated verifier signature (generally abbreviated to SDVS) allows signers to obtain absolute control over who can verify the signature, while only the designated verifier other than anyone else can verify the validity of a SDVS without being able to transfer the conviction. Certificateless PKC has unique advantages comparing with certificate-based cryptosystems and identity-based PKC, without suffering from key escrow. Motivated by these attractive features, we propose a novel efficient CL-SDVS scheme without bilinear pairings or map-to-point hash operations. The proposed scheme achieves all the required security properties including EUF-CMA, non-transferability, strongness and non-delegatability. We also estimate the computationa...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
Certificateless public key cryptography (CL-PKC) overcomes the difficulties of the certificate manag...
Certificate-based public key cryptography not only solves certificate revocation problem in traditio...
Designated verifier signature (DVS) allows a signer to convince a designated verifier that a signatu...
Recently, several strong designated verifier signature schemes have been proposed in the literature....
Certificateless cryptography addresses the private key escrow problem in identity-based systems, whi...
In this study, a novel pairing based strong designated verifier signature scheme based on non-intera...
In a designated verifier signature (DVS) scheme, the signer (Alice) creates a signature which is onl...
Up to now, several non-delegatable identity-based (strong) designated verifier signature schemes usi...
Certificateless cryptography is a well-known system to avoid the key escrow prob-lem of identity-bas...
Strong designated verifier signature can provide an efficient way to protect the identity privacy of...
An efficient certificateless signature from pairings A certificateless signature retains the efficie...
Abstract: A Designated Verifier Signature (DVS) scheme has the property of signer ambiguity, which c...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
Certificateless public key cryptography (CL-PKC) overcomes the difficulties of the certificate manag...
Certificate-based public key cryptography not only solves certificate revocation problem in traditio...
Designated verifier signature (DVS) allows a signer to convince a designated verifier that a signatu...
Recently, several strong designated verifier signature schemes have been proposed in the literature....
Certificateless cryptography addresses the private key escrow problem in identity-based systems, whi...
In this study, a novel pairing based strong designated verifier signature scheme based on non-intera...
In a designated verifier signature (DVS) scheme, the signer (Alice) creates a signature which is onl...
Up to now, several non-delegatable identity-based (strong) designated verifier signature schemes usi...
Certificateless cryptography is a well-known system to avoid the key escrow prob-lem of identity-bas...
Strong designated verifier signature can provide an efficient way to protect the identity privacy of...
An efficient certificateless signature from pairings A certificateless signature retains the efficie...
Abstract: A Designated Verifier Signature (DVS) scheme has the property of signer ambiguity, which c...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
Certificateless public key cryptography (CL-PKC) overcomes the difficulties of the certificate manag...