The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Privacy-preserving authentication scheme with full aggregation in VANET

H Zhong, S Han, J Cui, J Zhang, Y Xu - Information Sciences, 2019 - Elsevier
Abstract Vehicular Ad-hoc Network (VANET) is the fundamental of intelligent transportation
systems. Security and privacy are the important issues needed to be addressed. Existing …

Efficient certificateless aggregate signature with conditional privacy preservation in IoV

Q Mei, H **ong, J Chen, M Yang, S Kumari… - IEEE Systems …, 2020 - ieeexplore.ieee.org
As an extension of traditional vehicular ad hoc networks, the Internet of Vehicles (IoV)
enables information collection and dissemination, which brings a lot of convenience and …

An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks

J Cui, J Zhang, H Zhong, R Shi, Y Xu - Information Sciences, 2018 - Elsevier
In order to eliminate the complexity associated with managing public key encryption
certificates and the drawbacks of identity-based encryption key escrows, the concept of …

An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks

SJ Horng, SF Tzeng, PH Huang, X Wang, T Li… - Information …, 2015 - Elsevier
Certificateless public key cryptography was introduced to solve the complicated certificate
management problem in traditional public key cryptography and the key escrow problem in …

Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT

Y Zhang, RH Deng, D Zheng, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …

A certificateless aggregate signature scheme for healthcare wireless sensor network

P Kumar, S Kumari, V Sharma, AK Sangaiah… - … Informatics and Systems, 2018 - Elsevier
Healthcare industry is one of the areas where wireless sensor network provides a lot of
opportunities. Online data sharing in healthcare industry not only increases the efficiency but …

Certificateless signature revisited

X Huang, Y Mu, W Susilo, DS Wong, W Wu - Australasian Conference on …, 2007 - Springer
In this paper we revisit the security models of certificateless signatures and propose two new
constructions which are provably secure in the random oracle model. We divide the potential …

On the security of certificateless signature schemes from Asiacrypt 2003

X Huang, W Susilo, Y Mu, F Zhang - Cryptology and Network Security: 4th …, 2005 - Springer
In traditional digital signature schemes, certificates signed by a trusted party are required to
ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless …

Certificateless public-key signature: security model and efficient construction

Z Zhang, DS Wong, J Xu, D Feng - … , ACNS 2006, Singapore, June 6-9 …, 2006 - Springer
Abstract “Certificateless public-key cryptosystem” is a new and attractive paradigm, which
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …