Isogeny-Based Certificateless Identification Scheme

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Certificateless undeniable signature scheme

The concept of certificateless public key cryptography (CL-PKC) was introduced by Al-Riyami and Paterson. Such a cryptosystem does not suffer from the key escrow problem while avoiding the onerous management of certificates. In this paper, we present the first certificateless undeniable signature scheme. We consider two different types of adversaries and formalize the security notions for certi...

متن کامل

Efficient Certificateless Signcryption Scheme

In this paper, we propose a certificateless signcryption scheme from Weil pairings and give a practical security model. Compared with existing schemes, the new scheme is more efficient.

متن کامل

A Strong RSA-based and Certificateless-based Signature Scheme

The certificateless-based signature system allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority (CA) to store and manage users’ certificates and public keys. Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system. In 2012, Zhang and Mao...

متن کامل

Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme

In this paper, we propose an Undeniable Blind Signature scheme (UBSS) based on isogenies between supersingular elliptic curves. The proposed UBSS is an extension of the Jao-Soukharev undeniable signature scheme [19]. We formalize the notion of a UBSS by giving the formal definition. We then study its properties along with the pros and cons. Based on this, we provide a couple of its applcations....

متن کامل

Certificateless undeniable signature scheme q

In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based cryptosystems. Also it can avoid the onerous management of certificates. Particularly, by using some cryptographic and mathematical techniques, we guarantee that the scheme’s two component protocols satisfy the properties of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Algebraic structures and their applications

سال: 2019

ISSN: 2382-9761,2423-3447

DOI: 10.29252/asta.6.1.85