Certificateless cryptography

Certificateless cryptography is a variant of ID-based cryptography intended to prevent the key escrow problem. Ordinarily, keys are generated by a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
051020052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
We propose a mediated certificateless encryption scheme without pairing operations. Mediated certificateless public key… (More)
Is this relevant?
2010
2010
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity… (More)
Is this relevant?
2008
2008
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
2007
2007
Ring signature is a kind of group-oriented signature. It allows a<lb>member of a group to sign messages on behalf of the group… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret… (More)
Is this relevant?
2006
2006
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Certificateless cryptography involves a Key Generation Center (KGC) which issues a partial key to a user and the user also… (More)
Is this relevant?
2006
2006
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the… (More)
Is this relevant?