Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Certificateless cryptography

Certificateless cryptography is a variant of ID-based cryptography intended to prevent the key escrow problem. Ordinarily, keys are generated by a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Wireless body area networks (WBANs) consist of many small low-power sensors, through which users could monitor the real-time… Expand
  • figure 1
  • figure 2
  • table I
  • table II
Is this relevant?
Highly Cited
2015
Highly Cited
2015
To ensure the security and privacy of the patient's health status in the wireless body area networks (WBANs), it is critical to… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
Is this relevant?
2010
2010
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy… Expand
Is this relevant?
2010
2010
Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group… Expand
Is this relevant?
2009
2009
Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity… Expand
Is this relevant?
2008
2008
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the… Expand
Is this relevant?