A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings

@article{Wang2015AME,
  title={A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings},
  author={Liangliang Wang and Kefei Chen and Yu Long and Xianping Mao and Huige Wang},
  journal={2015 International Conference on Intelligent Networking and Collaborative Systems},
  year={2015},
  pages={82-85}
}
  • Liangliang Wang, Kefei Chen, +2 authors Huige Wang
  • Published 2015
  • Computer Science
  • 2015 International Conference on Intelligent Networking and Collaborative Systems
  • Certificateless public key cryptography was proposed to solve the key escrow problem in identity-based public key cryptography. Namely, a user's full private key must be comprised of a partial private key which is provided by the key generation center and a secret value which is chosen by the user. Thus the key generation center can no longer acquire each user's full private key by itself. In 2014, Yeh et al. proposed an efficient certificateless public key signature scheme without bilinear… CONTINUE READING

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 11 CITATIONS

    Cryptanalysis of Wang et al's Certificateless Signature Scheme without Bilinear Pairings

    • Kuo-Hui Yeh
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2017
    VIEW 1 EXCERPT
    CITES BACKGROUND

    A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments

    VIEW 12 EXCERPTS
    CITES BACKGROUND, METHODS & RESULTS
    HIGHLY INFLUENCED

    A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    VIEW 10 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 12 REFERENCES

    An efficient certificateless signature scheme without bilinear pairings

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    An efficient certificateless designated verifier signature scheme

    VIEW 2 EXCERPTS

    Certificateless Public Key Cryptography

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Malicious KGC attacks in certificateless cryptography

    VIEW 1 EXCERPT

    Identity-Based Cryptosystems and Signature Schemes

    VIEW 1 EXCERPT

    New directions in cryptography

    VIEW 8 EXCERPTS
    HIGHLY INFLUENTIAL