The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
A survey of certificateless encryption schemes and security models
AW Dent - International Journal of Information Security, 2008 - Springer
This paper surveys the literature on certificateless encryption schemes. In particular, we
examine the large number of security models that have been proposed to prove the security …
examine the large number of security models that have been proposed to prove the security …
Certificateless searchable public key encryption scheme for industrial internet of things
With the widespread adoption of Internet of Things and cloud computing in different industry
sectors, an increasing number of individuals or organizations are outsourcing their Industrial …
sectors, an increasing number of individuals or organizations are outsourcing their Industrial …
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Certificateless public key cryptography was introduced to solve the complicated certificate
management problem in traditional public key cryptography and the key escrow problem in …
management problem in traditional public key cryptography and the key escrow problem in …
Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
Certificateless signature revisited
In this paper we revisit the security models of certificateless signatures and propose two new
constructions which are provably secure in the random oracle model. We divide the potential …
constructions which are provably secure in the random oracle model. We divide the potential …
A new certificateless aggregate signature scheme
L Zhang, F Zhang - Computer Communications, 2009 - Elsevier
Aggregate signatures are useful in special areas where the signatures on many different
messages generated by many different users need to be compressed. In this paper, we …
messages generated by many different users need to be compressed. In this paper, we …
Certificateless signcryption scheme in the standard model
Z Liu, Y Hu, X Zhang, H Ma - Information Sciences, 2010 - Elsevier
Certificateless public key signcryption scheme is an important cryptographic primitive in
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …
cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme …
Efficient certificateless aggregate signature scheme for performing secure routing in VANETs
Certificateless public key cryptosystem solves both the complex certificate management
problem in the public key cryptosystem based on the PKI and the key escrow issue in the …
problem in the public key cryptosystem based on the PKI and the key escrow issue in the …
An efficient and privacy-preserving blockchain-based authentication scheme for low earth orbit satellite-assisted internet of things
Recently, integrating satellite networks (eg, low-Earth-orbit (LEO) satellite constellation) into
the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more …
the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more …