proxy signature
Recently Published Documents


TOTAL DOCUMENTS

525
(FIVE YEARS 43)

H-INDEX

26
(FIVE YEARS 1)

2021 ◽  
pp. 106170
Author(s):  
Fei Zhu ◽  
Feihong Xu ◽  
Xu Yang ◽  
Xun Yi ◽  
Alsharif Abuadbba

Author(s):  
Jianhong Chen ◽  
Kun Yu ◽  
Wenhao Wang

Key exposure is very harmful to a cryptographic system. To decrease the loss from the deputy signing key vulnerability in identity-based proxy signature systems, we propose the method of key protected deputy signature (IBKPDS) using the method of parallel key insulation. The proposed IBKPDS is based on identities and is shown to be secure with the cryptographic proof. In the proof, there is no random oracle. In an IBKPPS crypto-system, a user stores his short-lived deputy signing key by himself and saves two long-lived keys in two heavily guarded boxes respectively. The derived IBKPDS cryptographic system is heavily key-separated. A thief who wants to obtain crucial information can not corrupt the IBKPDS when he get only one long-lived key. In addition, the user can change the short-lived deputy signing keys frequently at low risk.


2021 ◽  
Vol 33 (5) ◽  
pp. 1565
Author(s):  
Jinbin Zheng ◽  
Huang Zhang ◽  
Baodian Wei ◽  
Yusong Du ◽  
Hsien-Wei Tseng

Author(s):  
Mai A. Abdel-Malek ◽  
Kemal Akkaya ◽  
Arupjyoti Bhuyan ◽  
Ahmed S. Ibrahim
Keyword(s):  

2021 ◽  
Vol 10 (1) ◽  
pp. 57
Author(s):  
Ms. K. Sudharani ◽  
Dr. N. K. Sakthivel

Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. It yields better security than the ID-based cryptography scheme without requiring digital certificates. In the CL-PKC scheme, as the Key Generation Center (KGC) generates a public key using a partial secret key, the need for authenticating the public key by a trusted third party is avoided. Due to the lack of authentication, the public key associated with the private key of a user may be replaced by anyone. Therefore, the ciphertext cannot be decrypted accurately. To mitigate this issue, an Enhanced Certificateless Proxy Signature (E-CLPS) is proposed to offer high security guarantee and requires minimum computational cost. In this work, the Hackman tool is used for detecting the dictionary attacks in the cloud. From the experimental analysis, it is observed that the proposed E-CLPS scheme yields better Attack Detection Rate, True Positive Rate, True Negative Rate and Minimum False Positives and False Negatives than the existing schemes.   


2021 ◽  
Vol 10 (1) ◽  
pp. 487-492
Author(s):  
Mohd Saiful Adli Mohamad ◽  
Roshidi Din ◽  
Jasmin Ilyani Ahmad

One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper. 


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Sumit Kumar Debnath ◽  
Tanmay Choudhury ◽  
Pantelimon Stănică ◽  
Kunal Dey ◽  
Nibedita Kundu

2021 ◽  
Vol 15 (1) ◽  
pp. 117-137
Author(s):  
Salome James ◽  
Gowri Thumbur ◽  
Vasudeva Reddy P.

In many real-world situations, signature schemes with message recovery plays a very important role to minimize the bandwidth for efficient communications. A proxy signature scheme is a kind of digital signature scheme that allows an original signer to designate his/her signing capacity to a proxy signer. The proxy signer generates a signature on a message on behalf of the original signer. Such signatures are very useful in various applications where the delegation rights is quite common, especially in distributed systems and grid computing. This paper presents a pairing-free proxy signature with message recovery scheme that integrates the advantages of proxy signatures and message recovery in identity based setting. This scheme improves the computational and communicational efficiency due to pairing-free and message recovery features. The proposed scheme is proven secure in the random oracle model under the hardness assumption of the ECDLP. The comparison results shows that the proposed scheme is superior to the related works from the aspect of security and performance.


Sign in / Sign up

Export Citation Format

Share Document