Abstract. In this paper we propose a certificateless signature scheme based on bilinear pairings. The scheme effectively removes secure channel for key issuance between trusted authority and users and avoids key escrow problem, which is an inherent drawback in ID-based cryptosystems. The scheme uses a simple blinding technique to eliminate the need of secure channel and user chosen secret value to avoid the key escrow problem. The signature scheme is secure against adaptive chosen message attack in the random oracle model
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the sign...
Certificateless public key cryptography solves the certificate management problem in the t...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
A certificateless signature retains the efficiency of Shamir\u27s identity-based signature while it ...
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could...
Certificateless cryptography addresses the private key escrow problem in identity-based systems, whi...
Abstract. ID-based public key systems allow the user to use his/her identity as the public key, whic...
Abstract. Signcryption is a cryptographic primitive that fulfills both the functions of digital sign...
Abstract. In this paper we describe how to construct an efficient certificateless signcryption schem...
Ring signature is a kind of digital signature which can protect the identity of the signer. Certific...
Certificateless signature schemes are a very intriguing aspect in information security because of it...
Signcryption, which was introduced by ZHENG, is a cryptographic primitive that fulfils the functions...
Certificateless cryptography shares many features of identity-based cryptography and partially solve...
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme, or a signc...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the sign...
Certificateless public key cryptography solves the certificate management problem in the t...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...
A certificateless signature retains the efficiency of Shamir\u27s identity-based signature while it ...
Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could...
Certificateless cryptography addresses the private key escrow problem in identity-based systems, whi...
Abstract. ID-based public key systems allow the user to use his/her identity as the public key, whic...
Abstract. Signcryption is a cryptographic primitive that fulfills both the functions of digital sign...
Abstract. In this paper we describe how to construct an efficient certificateless signcryption schem...
Ring signature is a kind of digital signature which can protect the identity of the signer. Certific...
Certificateless signature schemes are a very intriguing aspect in information security because of it...
Signcryption, which was introduced by ZHENG, is a cryptographic primitive that fulfils the functions...
Certificateless cryptography shares many features of identity-based cryptography and partially solve...
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme, or a signc...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the sign...
Certificateless public key cryptography solves the certificate management problem in the t...
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditio...