2014 Tenth International Conference on Computational Intelligence and Security 2014
DOI: 10.1109/cis.2014.101
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Later, Galindo and Garcia designed a scheme by utilizing the technique used in Schnorr signature scheme for generating the private key (used by the PKG), as well as the signature (by the third party). After that, Wang proposed a fuzzy IDS scheme under the ROM without considering bilinear pairing operation. In 2017, Alezabi et al proposed a technique; however, emphasizing the authentication of entities' identities and reauthentication after renewing the entities' identities makes this method not very suitable for the different types of resource constrained devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Later, Galindo and Garcia designed a scheme by utilizing the technique used in Schnorr signature scheme for generating the private key (used by the PKG), as well as the signature (by the third party). After that, Wang proposed a fuzzy IDS scheme under the ROM without considering bilinear pairing operation. In 2017, Alezabi et al proposed a technique; however, emphasizing the authentication of entities' identities and reauthentication after renewing the entities' identities makes this method not very suitable for the different types of resource constrained devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Later on, Boneh and Franklin instantiated Shamir's idea and implemented IBE using bilinear pairing over elliptic curve (EC) points, Subsequently, several modifications and enhancements based on Boneh and Franklin's IBE have been proposed, and their safety based on the standard security assumption and model have been presented . On the other side, several ID‐based signature and authentication schemes were proposed in the literature. Due to several kind of attacks, like mafia attacks and blackmailing, a special kind of signature called designated verifier signature (DVS) scheme was proposed by Jakobsson et al The concept was introduced due to the fact that a signer has no knowledge about to whom (s)he is generating the signature.…”
Section: Introductionmentioning
confidence: 99%
“…And it also solves the public key management problem existed in public-key setting, Therefore, certificateless public key cryptography has interested many researchers. Many certificateless public key cryptography have been proposed, such as [9], [10], [11], [12], [13], [14].…”
Section: Introductionmentioning
confidence: 99%