Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
Public Key Cryptosystem (PKC) completely relies under the assumption that user’s private key is absolutely secure. Exposure of private key may lead to disastrous situations in the communication network. To diminish the damage of private key exposure in PKC, key-insulation mechanism was introduced. I...
| Published in: | Journal of King Saud University: Computer and Information Sciences |
|---|---|
| Main Authors: | P. Vasudeva Reddy, A. Ramesh Babu, N.B. Gayathri |
| Format: | Article |
| Language: | English |
| Published: |
Springer
2021-12-01
|
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S1319157818304051 |
Similar Items
Identity-based key-insulated aggregate signature scheme
by: P. Vasudeva Reddy, et al.
Published: (2017-07-01)
by: P. Vasudeva Reddy, et al.
Published: (2017-07-01)
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
by: Rui Ma, et al.
Published: (2022-01-01)
by: Rui Ma, et al.
Published: (2022-01-01)
Attribute-Based Parallel Key-Insulated Signature
by: Chen Jianhong, et al.
Published: (2015-09-01)
by: Chen Jianhong, et al.
Published: (2015-09-01)
Efficient and secure pairing-free certificateless directed signature scheme
by: Gayathri Nemani Bhagya, et al.
Published: (2021-02-01)
by: Gayathri Nemani Bhagya, et al.
Published: (2021-02-01)
Unconditionally secure signature schemes revisited
by: Swanson Colleen M., et al.
Published: (2016-03-01)
by: Swanson Colleen M., et al.
Published: (2016-03-01)
Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
by: Rolla Subrahmanyam, et al.
Published: (2023-01-01)
by: Rolla Subrahmanyam, et al.
Published: (2023-01-01)
Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”
by: Je Hong Park, et al.
Published: (2024-01-01)
by: Je Hong Park, et al.
Published: (2024-01-01)
Identity-based puncturable signature scheme
by: Dongmei YANG, et al.
Published: (2021-12-01)
by: Dongmei YANG, et al.
Published: (2021-12-01)
Identity-based puncturable signature scheme
by: Dongmei YANG, et al.
Published: (2021-12-01)
by: Dongmei YANG, et al.
Published: (2021-12-01)
Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings
by: Kyung-Ah Shim
Published: (2020-01-01)
by: Kyung-Ah Shim
Published: (2020-01-01)
Certificateless signature scheme without bilinear pairings
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
Certificateless signature scheme without bilinear pairings
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
Comments on “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs”
by: Je Hong Park, et al.
Published: (2024-01-01)
by: Je Hong Park, et al.
Published: (2024-01-01)
Rank AGS Identification Scheme and Signature Scheme
by: Vaishnavi Nagaraja, et al.
Published: (2023-02-01)
by: Vaishnavi Nagaraja, et al.
Published: (2023-02-01)
Construction of the content extraction signature scheme based on the thought of the batch scheme
by: Zixin TANG, et al.
Published: (2018-12-01)
by: Zixin TANG, et al.
Published: (2018-12-01)
An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things
by: Tahir Ali Shah, et al.
Published: (2023-01-01)
by: Tahir Ali Shah, et al.
Published: (2023-01-01)
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation
by: Yang Shi, et al.
Published: (2016-01-01)
by: Yang Shi, et al.
Published: (2016-01-01)
Identity-based Key-insulated Provable Multi-copy Data Possession in Multi-cloud Storage
by: ZHOU Jie, WANG Huaqun
Published: (2025-01-01)
by: ZHOU Jie, WANG Huaqun
Published: (2025-01-01)
Threshold Signature Schemes Application
by: Anastasiya Victorovna Beresneva, et al.
Published: (2015-10-01)
by: Anastasiya Victorovna Beresneva, et al.
Published: (2015-10-01)
An Analysis of Blind Signature Schemes
by: Anna Vasilievna Epishkina, et al.
Published: (2015-10-01)
by: Anna Vasilievna Epishkina, et al.
Published: (2015-10-01)
Revocable Signature Scheme with Implicit and Explicit Certificates
by: Jerzy Pejaś, et al.
Published: (2023-09-01)
by: Jerzy Pejaś, et al.
Published: (2023-09-01)
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
by: Yong Wang, et al.
Published: (2024-07-01)
by: Yong Wang, et al.
Published: (2024-07-01)
A lightweight certificateless aggregate signature scheme without pairing for VANETs
by: Qiuling Yue, et al.
Published: (2025-07-01)
by: Qiuling Yue, et al.
Published: (2025-07-01)
ID-based, Proxy, Threshold Signature Scheme
by: Jacek Pomykała, et al.
Published: (2021-05-01)
by: Jacek Pomykała, et al.
Published: (2021-05-01)
ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property
by: Suman Majumder, et al.
Published: (2024-01-01)
by: Suman Majumder, et al.
Published: (2024-01-01)
Cryptanalysis of Compact Certificateless Aggregate Signature Schemes for HWMSNs and VANETs
by: Kyung-Ah Shim
Published: (2024-01-01)
by: Kyung-Ah Shim
Published: (2024-01-01)
Digital multi-signature scheme based on bilinear pairing
by: Cai-juan ZHANG, et al.
Published: (2016-06-01)
by: Cai-juan ZHANG, et al.
Published: (2016-06-01)
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
by: N.R. Sunitha, et al.
Published: (2011-08-01)
by: N.R. Sunitha, et al.
Published: (2011-08-01)
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments
by: Dae-Hwi Lee, et al.
Published: (2020-07-01)
by: Dae-Hwi Lee, et al.
Published: (2020-07-01)
Security analysis and improvement of strongly secure certificate less signature scheme
by: Ai-wan FAN, et al.
Published: (2014-05-01)
by: Ai-wan FAN, et al.
Published: (2014-05-01)
Security analysis and improvement of strongly secure certificate less signature scheme
by: Ai-wan FAN, et al.
Published: (2014-05-01)
by: Ai-wan FAN, et al.
Published: (2014-05-01)
Identity based and key insulated cryptosystem
by: ZHOU Yuan1, et al.
Published: (2009-01-01)
by: ZHOU Yuan1, et al.
Published: (2009-01-01)
Identity based and key insulated cryptosystem
by: ZHOU Yuan1, et al.
Published: (2009-01-01)
by: ZHOU Yuan1, et al.
Published: (2009-01-01)
A Trusted-ID Referenced Key Scheme for Securing SCADA Communication in Iron and Steel Plants
by: Junlei Qian, et al.
Published: (2019-01-01)
by: Junlei Qian, et al.
Published: (2019-01-01)
APPLICATION OF LAMPORT DIGITAL SIGNATURE SCHEME INTO THE STATION-TO-STATION PROTOCOL
by: Md Nizam Udin, et al.
Published: (2022-10-01)
by: Md Nizam Udin, et al.
Published: (2022-10-01)
Two-Round Multi-Signatures from Okamoto Signatures
by: Kwangsu Lee, et al.
Published: (2023-07-01)
by: Kwangsu Lee, et al.
Published: (2023-07-01)
Efficient traceable identity-based signature scheme
by: DU Hong-zhen1, et al.
Published: (2009-01-01)
by: DU Hong-zhen1, et al.
Published: (2009-01-01)
Efficient traceable identity-based signature scheme
by: DU Hong-zhen1, et al.
Published: (2009-01-01)
by: DU Hong-zhen1, et al.
Published: (2009-01-01)
Threshold Digital Signature Scheme with Shared Key Based on GOST R 34.10-2001
by: P. O. Dzhunkovskiy, et al.
Published: (2010-09-01)
by: P. O. Dzhunkovskiy, et al.
Published: (2010-09-01)
Secure and efficient two-party ECDSA signature scheme
by: Jing WANG, et al.
Published: (2021-02-01)
by: Jing WANG, et al.
Published: (2021-02-01)
Similar Items
-
Identity-based key-insulated aggregate signature scheme
by: P. Vasudeva Reddy, et al.
Published: (2017-07-01) -
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
by: Rui Ma, et al.
Published: (2022-01-01) -
Attribute-Based Parallel Key-Insulated Signature
by: Chen Jianhong, et al.
Published: (2015-09-01) -
Efficient and secure pairing-free certificateless directed signature scheme
by: Gayathri Nemani Bhagya, et al.
Published: (2021-02-01) -
Unconditionally secure signature schemes revisited
by: Swanson Colleen M., et al.
Published: (2016-03-01)
