Introduction to Certificateless Cryptography

Author(s):  
Hu Xiong ◽  
Zhen Qin ◽  
Athanasios V. Vasilakos
2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Rui Guo ◽  
Qiaoyan Wen ◽  
Huixian Shi ◽  
Zhengping Jin ◽  
Hua Zhang

Certificateless cryptography aims at combining the advantages of public key cryptography and identity based cryptography to avoid the certificate management and the key escrow problem. In this paper, we present a novel certificateless public key encryption scheme on the elliptic curve over the ring, whose security is based on the hardness assumption of Bilinear Diffie-Hellman problem and factoring the large number as in an RSA protocol. Moreover, since our scheme requires only one pairing operation in decryption, it is significantly more efficient than other related schemes. In addition, based on our encryption system, we also propose a protocol to protect the confidentiality and integrity of information in the scenario of Internet of Things with constrained resource nodes.


Author(s):  
Nashwa A.F. Mohamed ◽  
Mohsin H.A. Hashim ◽  
Eihab B.M. Bashier ◽  
Mohamed E.H. Hassouna

2014 ◽  
Vol 272 ◽  
pp. 223-237 ◽  
Author(s):  
Lei Zhang ◽  
Qianhong Wu ◽  
Josep Domingo-Ferrer ◽  
Bo Qin ◽  
Peng Zeng

2012 ◽  
Vol 546-547 ◽  
pp. 1065-1070
Author(s):  
Zhe Fu Yu ◽  
Hai Gang Zhou ◽  
Zhao Feng Wu

The article introduces a certificateless signcryption scheme targeting the problem of lacking of security mechanism in the routing of satellite networks, and designs a secure routing protocol suitable for the satellite networks. The proposed protocol avoids complicated management in the certificate mechanism and bypasses the key escrow problem in the identity-based cryptography using the certificateless cryptography and signcryption. The analysis shows that the new protocol can resist several common attacks, effectively improve the security of the satellite networks routing.


2011 ◽  
Vol 412 (39) ◽  
pp. 5446-5457 ◽  
Author(s):  
Guomin Yang ◽  
Chik How Tan

2014 ◽  
Vol 685 ◽  
pp. 532-535
Author(s):  
Su Li Wang ◽  
Jun Yao Ye

This paper researches on the existing certificateless proxy signature scheme, there is almost no certificateless proxy signature scheme based on discrete logarithm up till now. Combining the knowledge of discrete logarithm over finite field and the advantages of certificateless cryptography, this paper proposes an efficient certificateless proxy signature scheme based on the discrete logarithm without bilinear pairings. To avoid the key escrow problem in the id-based cryptosystem and the saving certificate problem in the traditional public cryptography, meet the good properties of the proxy signature, such as unforgery, dependence of the proxy keys, distinguish of the proxy signature and anti-abuse. The scheme does not use the bilinear pairings, and based on the hard problem of discrete logarithm in the finite field, given the proof and discussion of the validity and security of the scheme.


Sign in / Sign up

Export Citation Format

Share Document