Learn More
Multi-user broadcast authentication enables a large number of users to join in and broadcast messages to wireless sensor networks (WSN) dynamically and authentically. Public-key-based schemes have been proposed to provide such services; however, none of them achieve security, scalability and efficiency simultaneously. This paper presents IMBAS, an(More)
Certificateless Public Key Cryptography (CL-PKC) has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography). However, it does suffer to the Denialof-Decryption (DoD) Attack called by Liu and Au [1], as its nature is similar to(More)
Based on the computational Diffie–Hellman problem, this paper proposes an identitybased authenticated key agreement protocol which removes bilinear pairings. Compared with previous protocols, the new protocol minimizes message exchange time with no extra cost. The protocol provides strong security guarantees including key compromise impersonation(More)
Blind signature is the concept to ensure anonymity of e-coin. Untracebility and unlinkability are two main properties of real coin, which require mimicking electronically. Proxy signature schemes allow a proxy signer to generate a proxy signature on behalf of an original signer. All the previous proxy signature schemes are based on ElGamal-type schemes. We(More)
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public key of a delegator (say Alice), into a new ciphertext that is protected under the public key of a delegatee (say Bob), and thus the same(More)