Key management for beyond 5G mobile small cells: A survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …
are unanimous that densification of mobile networks is the way forward. The densification …
A survey of certificateless encryption schemes and security models
AW Dent - International Journal of Information Security, 2008 - Springer
This paper surveys the literature on certificateless encryption schemes. In particular, we
examine the large number of security models that have been proposed to prove the security …
examine the large number of security models that have been proposed to prove the security …
Efficient unidirectional proxy re-encryption
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …
On the security of certificateless signature schemes from Asiacrypt 2003
In traditional digital signature schemes, certificates signed by a trusted party are required to
ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless …
ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless …
Chosen-ciphertext secure proxy re-encryption without pairings
In a proxy re-encryption system, a semi-trusted proxy can convert a ciphertext originally
intended for Alice into a ciphertext intended for Bob, without learning the underlying …
intended for Alice into a ciphertext intended for Bob, without learning the underlying …
Certificateless public-key signature: security model and efficient construction
Z Zhang, DS Wong, J Xu, D Feng - … , ACNS 2006, Singapore, June 6-9 …, 2006 - Springer
Abstract “Certificateless public-key cryptosystem” is a new and attractive paradigm, which
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a
ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has …
ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has …
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-
Based Cryptography (IBC) while without having the problem of key escrow. However, it does …
Based Cryptography (IBC) while without having the problem of key escrow. However, it does …
Malicious KGC attacks in certificateless cryptography
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation
Center (KGC) always knows user secret key. If the KGC is malicious, it can always …
Center (KGC) always knows user secret key. If the KGC is malicious, it can always …
LiKe: Lightweight certificateless key agreement for secure IoT communications
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against
the leakage of secret information stored on a trusted third party (TTP). These security …
the leakage of secret information stored on a trusted third party (TTP). These security …