Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

A survey of certificateless encryption schemes and security models

AW Dent - International Journal of Information Security, 2008 - Springer
This paper surveys the literature on certificateless encryption schemes. In particular, we
examine the large number of security models that have been proposed to prove the security …

Efficient unidirectional proxy re-encryption

SSM Chow, J Weng, Y Yang, RH Deng - … , South Africa, May 3-6, 2010 …, 2010 - Springer
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …

On the security of certificateless signature schemes from Asiacrypt 2003

X Huang, W Susilo, Y Mu, F Zhang - Cryptology and Network Security: 4th …, 2005 - Springer
In traditional digital signature schemes, certificates signed by a trusted party are required to
ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless …

Chosen-ciphertext secure proxy re-encryption without pairings

RH Deng, J Weng, S Liu, K Chen - … 2008, Hong-Kong, China, December 2 …, 2008 - Springer
In a proxy re-encryption system, a semi-trusted proxy can convert a ciphertext originally
intended for Alice into a ciphertext intended for Bob, without learning the underlying …

Certificateless public-key signature: security model and efficient construction

Z Zhang, DS Wong, J Xu, D Feng - … , ACNS 2006, Singapore, June 6-9 …, 2006 - Springer
Abstract “Certificateless public-key cryptosystem” is a new and attractive paradigm, which
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …

Conditional proxy re-encryption secure against chosen-ciphertext attack

J Weng, RH Deng, X Ding, CK Chu, J Lai - Proceedings of the 4th …, 2009 - dl.acm.org
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a
ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has …

Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model

JK Liu, MH Au, W Susilo - Proceedings of the 2nd ACM symposium on …, 2007 - dl.acm.org
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-
Based Cryptography (IBC) while without having the problem of key escrow. However, it does …

Malicious KGC attacks in certificateless cryptography

MH Au, Y Mu, J Chen, DS Wong, JK Liu… - Proceedings of the 2nd …, 2007 - dl.acm.org
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation
Center (KGC) always knows user secret key. If the KGC is malicious, it can always …

LiKe: Lightweight certificateless key agreement for secure IoT communications

P Tedeschi, S Sciancalepore, A Eliyan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against
the leakage of secret information stored on a trusted third party (TTP). These security …