2020
DOI: 10.1049/iet-ifs.2020.0096
|View full text |Cite
|
Sign up to set email alerts
|

Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…The research results indicated that the new protocol was maliciously secure under weaker assumptions. The new method could effectively solve the IoT data authentication security [11]. Gao, Zhigang et al proposed a user authentication method based on button time interval groups to address the high cost, and low accuracy in mobile device user authentication.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The research results indicated that the new protocol was maliciously secure under weaker assumptions. The new method could effectively solve the IoT data authentication security [11]. Gao, Zhigang et al proposed a user authentication method based on button time interval groups to address the high cost, and low accuracy in mobile device user authentication.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It also failed to preserve forward key secrecy [6]. The authors in [44,45] designed identitybased signature protocols to protect message exchanges in mobile devices. However, identity-based schemes have key escrow problems [46].…”
Section: Related Workmentioning
confidence: 99%
“…Feng et al 33 also designed a new share conversion protocol and constructed the first multiparty distributed signing method for the "identity-based signature scheme in IEEE 1363 standard. "…”
Section: Related Workmentioning
confidence: 99%
“…For protecting the private key in mobile devices, He et al 32 designed a novel two‐party distributed signing scheme for the “identity‐based signature in IEEE 1363 standard.” Their scheme permits two devices to create a valid signature without revealing the entire private key of the user. Feng et al 33 also designed a new share conversion protocol and constructed the first multiparty distributed signing method for the “identity‐based signature scheme in IEEE 1363 standard.”…”
Section: Related Workmentioning
confidence: 99%