4.2 Article

Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage

Jiguo Li et al.

Summary: To increase the availability and durability of outsourced data, many customers store multiple copies on multiple cloud servers. Existing PDP protocols mainly focus on single-copy storage and rely on PKI technique, which has security vulnerabilities and high communication/computational costs. In this paper, we propose a novel identity-based PDP scheme for multi-copy on multiple cloud storage servers, achieving both security and efficiency.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li et al.

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Software Engineering

Cryptanalysis and Improvement for Certificateless Aggregate Signature

Jiguo Li et al.

FUNDAMENTA INFORMATICAE (2018)

Article Computer Science, Information Systems

A Short Linearly Homomorphic Proxy Signature Scheme

Qun Lin et al.

IEEE ACCESS (2018)

Article Computer Science, Hardware & Architecture

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Jin Li et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Cryptanalysis and improvement of a certificateless aggregate signature scheme

Lin Cheng et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks

Shi-Jinn Horng et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Notes on the security of certificateless aggregate signature schemes

Futai Zhang et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

Insecurity of an efficient certificateless aggregate signature with constant pairing computations

Debiao He et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

New Construction of Efficient Certificateless Aggregate Signatures

He Liu et al.

INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2014)

Article Computer Science, Information Systems

An efficient certificateless aggregate signature with constant pairing computations

Hu Xiong et al.

INFORMATION SCIENCES (2013)

Article Engineering, Electrical & Electronic

An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications

Yipin Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2010)

Article Computer Science, Software Engineering

An ID-based aggregate signature scheme with constant pairing computations

Kyung-Ah Shim

JOURNAL OF SYSTEMS AND SOFTWARE (2010)

Article Computer Science, Information Systems

A new certificateless aggregate signature scheme

Lei Zhang et al.

COMPUTER COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

Securing mobile ad hoc networks with certificateless public keys

Yanchao Zhang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)