Certificateless public auditing scheme for cloud-assisted wireless body area networks

D He, S Zeadally, L Wu - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
Wireless body area networks (WBANs) consist of many small low-power sensors, through
which users could monitor the real-time parameters of patients' physiology remotely. This …

Certificateless two-party authenticated key agreement scheme for smart grid

L Deng, R Gao - Information Sciences, 2021 - Elsevier
Smart grid is a fully automated power transmission network. It monitors and controls each
user and grid node to ensure bidirectional flow of information and power between all nodes …

[HTML][HTML] An efficient certificateless two-party authenticated key agreement protocol

D He, S Padhye, J Chen - Computers & Mathematics with Applications, 2012 - Elsevier
Since certificateless public key cryptography (CLPKC) has received widespread attention
due to its efficiency in avoiding key escrow problems in identity-based public key …

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

SKH Islam, MK Khan… - Security and …, 2015 - Wiley Online Library
Recently, numerous multireceiver identity‐based encryption or identity‐based broadcast
encryption schemes have been introduced with bilinear pairing and probabilistic map‐to …

Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials

F Zhao, P Gong, S Li, M Li, P Li - Nonlinear Dynamics, 2013 - Springer
Three-party key agreement protocol is an important cryptographic mechanism for secure
communication, which allows two parties authenticate each other with the help of a trusted …

Further improvement of a certificateless signature scheme without pairing

P Gong, P Li - International Journal of Communication Systems, 2014 - Wiley Online Library
Recently, He et al. proposed an efficient certificateless signature (CLS) scheme without
pairings and demonstrated their scheme to be provably secure in the random oracle model …

New certificateless short signature scheme

D He, B Huang, J Chen - IET Information Security, 2013 - Wiley Online Library
The certificateless public key cryptography has attracted wide attention since it could solve
the certificate management problem in the traditional public key cryptography and the key …

A certificateless authenticated key agreement scheme for the power IoT

W Cui, R Cheng, K Wu, Y Su, Y Lei - Energies, 2021 - mdpi.com
Power Internet of Things (IoT) is the application of IoT technology in the field of power grid,
which can better control all kinds of power equipment, power personnel and operating …

Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography

SKH Islam, GP Biswas - International Journal of Computer …, 2013 - Taylor & Francis
A provably secure certificateless digital signature scheme using elliptic curve cryptography
is presented in this paper. Since the certificateless public key cryptosystem removes the …

[HTML][HTML] An efficient certificateless proxy signature scheme without pairing

D He, Y Chen, J Chen - Mathematical and Computer Modelling, 2013 - Elsevier
The proxy signature scheme allows a proxy signer to sign messages on behalf of an original
signer, a company or an organization. Such schemes have lots of practical applications …