期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Utilizing Certificateless Cryptography for IoT Device Identity Authentication Protocols in Web3
1
作者 WU Zhihui HONG Yuxuan +2 位作者 ZHOU Enyuan LIU Lei PEI Qingqi 《ZTE Communications》 2024年第2期30-38,共9页
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac... Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings. 展开更多
关键词 blockchain certificateless cryptography identity authentication IOT
在线阅读 下载PDF
Cross-domain data cloud storage auditing scheme based on certificateless cryptography 被引量:1
2
作者 Xu Yan Li Zheng +1 位作者 Ding Long Xu Rui 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第6期36-47,共12页
With the development of Internet of things(IoT), more and more intelligent terminal devices outsource data to cloud servers(CSs). However, the CS is not fully trusted, and the heterogeneity among different domains mak... With the development of Internet of things(IoT), more and more intelligent terminal devices outsource data to cloud servers(CSs). However, the CS is not fully trusted, and the heterogeneity among different domains makes it difficult for third-party auditor(TPA) to conduct an efficient integrity auditing of outsourced data. Therefore, the cross-domain data cloud storage auditing scheme based on certificateless cryptography is proposed, which can effectively avoid the big burden of certificate management or key escrow problems in identity-based cryptography. At the same time, TPA can effectively audit the integrity of outsourced data in different domains. Formal security proof and analysis show that the cloud storage auditing scheme satisfies the security and privacy requirements. Performance analysis demonstrates that the efficiency is acceptable. 展开更多
关键词 cloud storage auditing certificateless cryptography cross-domain Internet of things(IoT)
原文传递
Provably Secure Certificateless Ring Signcryption Scheme 被引量:11
3
作者 祁正华 杨庚 任勋益 《China Communications》 SCIE CSCD 2011年第3期99-106,共8页
Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inhere... Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inherent key escrow problem.In this paper a new certificateless ring signcryption scheme from pairings is presented.It is escrow free in that no KGC is able to decrypt ciphertexts itself.We then formally prove the security of the new scheme in the random oracle model IND-CCA2 and EUF-CMA. 展开更多
关键词 ring signcryption certificateless cryptography bilinear pairing
在线阅读 下载PDF
CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE 被引量:13
4
作者 Zhang Lei Zhang Futai 《Journal of Electronics(China)》 2008年第5期629-635,共7页
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-... Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem. 展开更多
关键词 certificateless cryptography Digital signature Blind signature certificateless blind signature Computational Diffie-Hellman (CDH) problem
在线阅读 下载PDF
Efficient Certificateless Aggregate Signature Scheme 被引量:2
5
作者 Yu-Chi Chen Gwoboa Homg +2 位作者 Chao-Liang Liu Yuan-Yu Tsa Chi-Shiang Chan 《Journal of Electronic Science and Technology》 CAS 2012年第3期209-214,共6页
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before f... In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before forwarding or sending these messages, then the verifier must spend a lot of computing time to verify their signatures. Consequently, the aggregate signature scheme is an effective method of improving efficiency in this kind of systems, which provides the convenience for the verifier. In this paper, we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification. This scheme is provably secure under the extended computational Diffie-Hellman assumption. 展开更多
关键词 Aggregate signature certificatelessaggregate signature certificateless cryptography digitalsignature.
在线阅读 下载PDF
An Efficient Certificateless Aggregate Signature Scheme Designed for VANET 被引量:2
6
作者 Cui Li Gang Wu +2 位作者 Lipeng Xing Feng Zhu Liang Zhao 《Computers, Materials & Continua》 SCIE EI 2020年第5期725-742,共18页
The Vehicular Ad-hoc Network(VANET)is the fundamental of smart transportation system in the future,but the security of the communication between vehicles and vehicles,between vehicles and roadside infrastructures have... The Vehicular Ad-hoc Network(VANET)is the fundamental of smart transportation system in the future,but the security of the communication between vehicles and vehicles,between vehicles and roadside infrastructures have become increasingly prominent.Certificateless aggregate signature protocol is used to address this security issue,but the existing schemes still have many drawbacks in terms of security and efficiency:First,many schemes are not secure,and signatures can be forged by the attacker;Second,even if some scheme are secure,many schemes use a large number of bilinear pairing operation,and the computation overhead is large.At the same time,the length of the aggregated signature also increases linearly with the increase of user numbers,resulting in a large communication overhead.In order to overcome the above challenges,we propose a new certificateless aggregate signature scheme for VANET,and prove the security of the scheme under the random oracle model.The new scheme uses pseudonym to realize the conditional privacy protection of the vehicle’s information.The new scheme does not use bilinear pairing operation,and the calculation efficiency is high.At the same time,the length of the aggregate signature of the new scheme is constant,thereby greatly reducing the communication and storage overhead.The analysis results demonstrate that the new scheme is not only safer,but also superior in performance to the recent related schemes in computation overhead and communication cost. 展开更多
关键词 Vehicular Ad-hoc network certificateless cryptography aggregate signature random oracle model
在线阅读 下载PDF
Pairing-Free Certificateless Key-Insulated Encryption with Provable Security
7
作者 Li-Bo He Dong-Jie Yan +1 位作者 Hu Xiong Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第1期50-56,共7页
Certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering t... Certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering the threat from the key exposure, it is desirable to incorporate the idea of key-insulated cryptosystem into the certificateless encryption. In this paper, we have designed an efficient certificateless keyinsulated encryption(CL-KIE) scheme to achieve this goal. By our approach, the computational performance of our scheme has been improved significantly in terms of reduction on running time and storage. We also gave the security proof of the new CL-KIE scheme against the chosen plaintext attacks(CPAs) in the random oracle, considering the assumption of the computational Diffie-Hellman(CDH) problem. 展开更多
关键词 certificateless cryptography keyinsulated pairing-free random oracle
在线阅读 下载PDF
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
8
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
An effective cross-domain identity authentication based on blockchain and certificateless cryptography for internet of vehicles
9
作者 Meiquan Wang Guangyu He +3 位作者 Yuanguo Bi Shicheng Xu Lexi Xu Zixuan Huang 《Journal of Control and Decision》 2025年第6期1022-1042,共21页
To address identity forgery and privacy leakage in Internet of vehicles(loV)within intelligent transportation systems,we propose an efficient cross-domain identity authentication(IA)scheme based on blockchain and cert... To address identity forgery and privacy leakage in Internet of vehicles(loV)within intelligent transportation systems,we propose an efficient cross-domain identity authentication(IA)scheme based on blockchain and certificateless cryptography.However,existing IA schemes often suffer from high computational overhead,limited scalability,or inadequate support for cross-domain scenarios.First,a distributed authentication architecture is designed,and an offchain storage mechanism combining blockchain and distributed hash table(DHT)to reduce storage costs.Second,a key generation scheme based on certificateless cryptography is designed to address key escrow problem.Third,a conditional privacy protection mechanism is proposed to achieve both anonymity and traceability of vehicle identities.A formal privacy evaluation is provided based on k-anonymity quantifies anonymity level under realistic adversary models.Finally,performance evaluations are conducted in terms of authentication delay,throughput,and success rate,demonstrating that the proposed scheme improves authentication efficiency while enhancing the system security and privacy. 展开更多
关键词 Internet of vehicles cross-domain identity authentication blockchain certificateless cryptography privacy protection
原文传递
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings 被引量:24
10
作者 WANG Shengbao CAO Zhenfu WANG Licheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1278-1282,共5页
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/ser... In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols. 展开更多
关键词 Web security authenticated key agreement certificateless public key cryptography bilinear pairings
在线阅读 下载PDF
Provable Efficient Certificateless Group Key Exchange Protocol 被引量:8
11
作者 CAO Chunjie MA Jianfeng MOON Sangjae 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期41-45,共5页
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol. 展开更多
关键词 group key exchange certificateless public key cryptography provable security bilinear pairings
在线阅读 下载PDF
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications 被引量:1
12
作者 Usman Ali Mohd Yamani Idna Idris +6 位作者 Jaroslav Frnda Mohamad Nizam Bin Ayub Roobaea Alroobaea Fahad Almansour Nura Modi Shagari Insaf Ullah Ihsan Ali 《Computers, Materials & Continua》 SCIE EI 2022年第5期2515-2532,共18页
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn... Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol. 展开更多
关键词 IoT security authentication protocols hyperelliptic curve cryptography certificateless public key cryptography
在线阅读 下载PDF
Certificateless universal designated verifier signature schemes 被引量:8
13
作者 MING Yang SHEN Xiao-qin WANG Yu-min 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期85-90,94,共7页
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unabl... Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact. The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required. This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed. The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system. Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve. 展开更多
关键词 certificateless cryptography universal designated verifier signature bilinear pairing
原文传递
Certificateless Encryption Scheme Secure in Standard Model 被引量:2
14
作者 张国艳 王小云 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第4期452-459,共8页
The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless enc... The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless encryption scheme is presented which is IND-CCA secure against both Type I and Type II at- tackers without random oracle. This encryption scheme can defend against the malicious key generation center attack, and can reach Girault's trusted level 3 as in traditional public key infrastructure-based cryp- tography. This certificateless encryption scheme has a shorter public key than other schemes in the stan- dard model. 展开更多
关键词 certificateless cryptography malicious key generation center key replacement attack IND-CCA secure
原文传递
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing 被引量:12
15
作者 Wenbo SHI Neeraj KUMAR +1 位作者 Peng GONG Zezhong ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第4期656-666,共11页
As an improtant cryptographic scheme, signcryption scheme has been widely used in applications since it could provide both of signature and encryption. With the development of the certificateless public key cryptograp... As an improtant cryptographic scheme, signcryption scheme has been widely used in applications since it could provide both of signature and encryption. With the development of the certificateless public key cryptography (CLPKC), many certificatelss signcryption (CLSC) schemes using bilinear pairing hve been proposed. Comparated other operations, the bilinear pairing operaion is much more compulicated. Therefore, CLSC scheme without bilinear pairing is more suitable for applications. Recently, Jing et al. proposed a CLSC scheme without bilinear pairing and claimed their scheme is secure against two types of adversaries. In this paper, we will show their scheme provide neither unforgeability property nor confidentiality property. To improve security, we also propose a new CLSC scheme without pairing and demonstrate it is provably secure in the random oracle model. 展开更多
关键词 certificateless public key cryptography signcryption scheme bilinear pairings elliptic curve random oracle model
原文传递
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model 被引量:1
16
作者 Lin CHENG Qiaoyan WEN Zhengping JIN Hua ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第1期163-173,共11页
Certificateless public key cryptography elimi- nates inherent key escrow problem in identity-based cryptog- raphy, and does not yet requires certificates as in the tradi- tional public key infrastructure. In this pape... Certificateless public key cryptography elimi- nates inherent key escrow problem in identity-based cryptog- raphy, and does not yet requires certificates as in the tradi- tional public key infrastructure. In this paper, we give crypt- analysis to Hwang et al.'s certificateless encryption scheme which is the first concrete certificateless encryption scheme that can be proved to be secure against "malicious-but- passive" key generation center (KGC) attack in the stan- dard model. Their scheme is proved to be insecure even in a weaker security model called "honest-but-curious" KGC at- tack model. We then propose an improved scheme which is really secure against "malicious-but-passive" KGC attack in the standard model. 展开更多
关键词 certificateless public key cryptography stan-dard model provable security
原文传递
Provable secure authentication key agreement for wireless body area networks
17
作者 Yuqian MA Wenbo SHI +1 位作者 Xinghua LI Qingfeng CHENG 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第5期189-199,共11页
Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.Howev... Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.However,with the speedy development of hardware,the existing security schemes can no longer meet the new requirements of anonymity and lightweight.New solutions that do not require complex calculations,such as certificateless cryptography,attract great attention from researchers.To resolve these difficulties,Wang et al.designed a new authentication architecture for the WBANs environment,which was claimed to be secure and efficient.However,in this paper,we will show that this scheme is prone to ephemeral key leakage attacks.Further,based on this authentication scheme,an anonymous certificateless scheme is proposed for lightweight devices.Meanwhile,user anonymity is fully protected.The proposed scheme is proved to be secure under a specific security model.In addition,we assess the security attributes our scheme meets through BAN logic and Scyther tool.The comparisons of time consumption and communication cost are given at the end of the paper,to demonstrate that our scheme performs prior to several previous schemes. 展开更多
关键词 wirelessbody area networks certificateless cryptography BAN logic Scyther
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部