The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
Privacy-preserving authentication scheme with full aggregation in VANET
Abstract Vehicular Ad-hoc Network (VANET) is the fundamental of intelligent transportation
systems. Security and privacy are the important issues needed to be addressed. Existing …
systems. Security and privacy are the important issues needed to be addressed. Existing …
Efficient certificateless aggregate signature with conditional privacy preservation in IoV
As an extension of traditional vehicular ad hoc networks, the Internet of Vehicles (IoV)
enables information collection and dissemination, which brings a lot of convenience and …
enables information collection and dissemination, which brings a lot of convenience and …
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks
In order to eliminate the complexity associated with managing public key encryption
certificates and the drawbacks of identity-based encryption key escrows, the concept of …
certificates and the drawbacks of identity-based encryption key escrows, the concept of …
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Certificateless public key cryptography was introduced to solve the complicated certificate
management problem in traditional public key cryptography and the key escrow problem in …
management problem in traditional public key cryptography and the key escrow problem in …
Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
A certificateless aggregate signature scheme for healthcare wireless sensor network
Healthcare industry is one of the areas where wireless sensor network provides a lot of
opportunities. Online data sharing in healthcare industry not only increases the efficiency but …
opportunities. Online data sharing in healthcare industry not only increases the efficiency but …
Certificateless signature revisited
In this paper we revisit the security models of certificateless signatures and propose two new
constructions which are provably secure in the random oracle model. We divide the potential …
constructions which are provably secure in the random oracle model. We divide the potential …
On the security of certificateless signature schemes from Asiacrypt 2003
In traditional digital signature schemes, certificates signed by a trusted party are required to
ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless …
ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless …
Certificateless public-key signature: security model and efficient construction
Z Zhang, DS Wong, J Xu, D Feng - … , ACNS 2006, Singapore, June 6-9 …, 2006 - Springer
Abstract “Certificateless public-key cryptosystem” is a new and attractive paradigm, which
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …