2016
DOI: 10.1093/comjnl/bxv115
|View full text |Cite
|
Sign up to set email alerts
|

Certificate-Based Key-Insulated Signature in the Standard Model: TABLE 1.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Zhang et al [17] presented a certificate-based signature by not entertaining the expensive operations of bilinear pairing. Li et al [18] contributed a keyinsulated certificate-based signature; however, Lu et al [19] proved that the scheme of [18] is not secure from malicious certifier. Also, the proposed certificate-based signature is with improved nature.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Zhang et al [17] presented a certificate-based signature by not entertaining the expensive operations of bilinear pairing. Li et al [18] contributed a keyinsulated certificate-based signature; however, Lu et al [19] proved that the scheme of [18] is not secure from malicious certifier. Also, the proposed certificate-based signature is with improved nature.…”
Section: Related Workmentioning
confidence: 99%
“…Here, we first provide major operations such as exponential (EPL), bilinear pairing (P), and hyperelliptic curve divisor multiplications (HM) in proposed certificate-based signature scheme and the other approaches such as by Lu and Li [16], Li et al [18], Lu et al [19], and Lu and Li [20], respectively, as given in Table 2. en, we consider the time taken by each major operations from [1], in which EPL consumes 1.25 ms, P takes 14.90 ms, and HM utilizes 0.48 ms, respectively [22,23].…”
Section: Computational Costmentioning
confidence: 99%
See 1 more Smart Citation
“…Lu and Li first apply the forward security notion into certificate-based cryptography, and they propose a forward secure certificate based signature scheme without a random oracle model [36]. They solve an issue that occurs when a certificated authority is malicious [37] and propose a certificate-based key-insulated signature that improves the security in certificate-based cryptography [38].…”
Section: Related Workmentioning
confidence: 99%
“…Xiong et al [40] proposed a pairingfree certificate-based key-insulated signature scheme for lowpower devices, and Lu et al [41] proposed a certificateless strong key-insulated signature in the standard model in 2015. Li et al [42] proposed a certificate-based key-insulated signature in the standard model in 2016. Hong and Sun [43] proposed an attribute-based key-insulated signcryption without bilinear pairings and applied it to mobile networks during the same year.…”
Section: Related Workmentioning
confidence: 99%