Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jun 25, 2013 · In this paper, we first define a security model for certificateless deniable authentication protocols. Then we propose a non-interactive ...
In this paper, we first define a security model for certificateless deniable authentication protocols. Then we propose a non-interactive certificateless ...
In this paper, we first define a security model for certificateless deniable authentication protocols. Then we propose a non-interactive certificateless ...
Abstract: Deniable authenticated protocol is a new and attractive protocol compared to the traditional authentication protocol.
In this paper, we first define a security model for certificateless deniable authentication protocols. Then we propose a non-interactive certificateless ...
TL;DR: This work proposes a certificateless deniably authenticated encryption (CLDAE) scheme that concurrently accomplishes the requirements of public key ...
Jul 25, 2019 · In this paper, we construct a certificateless DAE (CLDAE) scheme. The CLDAE is based on certificateless cryptosystems (CLCs), which avoids the ...
Missing: novel protocol.
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third ...
Missing: certificateless | Show results with:certificateless
In this paper, we have designed a deniable authenticated encryption scheme CL-DAE on certificateless setting. We formalize the security and adversary model for ...
Missing: novel | Show results with:novel
Mar 1, 2019 · As a remedy, we propose a certificateless deniably authenticated encryption (CLDAE) scheme that is provably secure. Typically, we can obtain ...