2013
DOI: 10.1371/journal.pone.0049141
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

Abstract: The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guaran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Unfortunately, traditional security services are incapable of militating non-cryptographic attacks, thus the need to investigate the impact of these attacks on localization algorithms with the aim of proposing methods that can be effectively used to detect and eliminate such threats from the network. Despite advances in the domain of secure localization [ 40 – 43 ], there is yet to be any study in the area of robustness of RSS-based localization algorithm generation against physical attacks. The evaluative study in this paper is therefore significant in its contribution to wireless sensor network designs, particularly in the area of protocol decisions drivers, which will enable engineers to make better informed decisions about whether there is a need for a more complicated security localization algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, traditional security services are incapable of militating non-cryptographic attacks, thus the need to investigate the impact of these attacks on localization algorithms with the aim of proposing methods that can be effectively used to detect and eliminate such threats from the network. Despite advances in the domain of secure localization [ 40 – 43 ], there is yet to be any study in the area of robustness of RSS-based localization algorithm generation against physical attacks. The evaluative study in this paper is therefore significant in its contribution to wireless sensor network designs, particularly in the area of protocol decisions drivers, which will enable engineers to make better informed decisions about whether there is a need for a more complicated security localization algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…At the same year, Pang et al [39] proposed an anonymous CLMS scheme, which is more efficient than schemes [37], [38] and offers receiver anonymity and source verifiability. Besides the aforementioned schemes, there are some other outstanding CLME/CLMS schemes [40]- [43] with various properties proposed for different application scenarios in recent years.…”
Section: Introductionmentioning
confidence: 99%