×
Unfortunately, all three schemes require pairing operations, enjoy high computation costs, and are not suitable for mobile devices. In this paper, we ...
Unfortunately, all three schemes require pairing operations, enjoy high computation costs, and are not suitable for mobile devices. In this paper, we ...
Unfortunately, all three schemes require pairing operations, enjoy high computation costs, and are not suitable for mobile devices. In this paper, we ...
Certificateless encryption scheme with provable security in the standard model suitable for mobile devices · Lunzhi Deng, Shuai Feng, Zhiwei Chen · Published in ...
It is generally known that the standard model (SM) is more reliable than the ROM. Currently, there are only three CLE schemes with provable security in SM.
Certificateless encryption scheme with provable security in the standard model suitable for mobile devices. https://doi.org/10.1016/j.ins.2022.09.021 ...
This encryption scheme can defend against the malicious key generation center attack, and can reach Girault's trusted level 3 as in traditional public key ...
People also ask
This paper constructed a new CLE scheme and gave the security proofs in SM and the size of the storage space required by the system is constant, ...
Abstract. This paper presents the first constructions for certificateless encryption (CLE) schemes that are provably secure against strong ad-.
Missing: provable mobile devices.
Recently, numerous certificateless encryption (CLE) schemes have been introduced. The security proofs of most schemes are given under the random oracle ...