Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS

Parvin Rastegari

Volume 14, Issue 2 , July 2022, , Pages 193-213

http://dx.doi.org/10.22042/isecure.2022.266258.602

Abstract
  The certificateless public key cryptography (CL-PKC) setting, makes it possible to overcome the problems of the conventional public key infrastructure and the ID-Based public key cryptography, concurrently. A certificateless signcryption (CL-SC) scheme is an important cryptographic primitive which provides ...  Read More

Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud

Aniseh Najafi; Majid Bayat; Hamid Haj Seyyed Javadi

Volume 13, Issue 2 , July 2021, , Pages 87-100

http://dx.doi.org/10.22042/isecure.2021.227562.542

Abstract
  The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising ...  Read More

An efficient certificateless signcryption scheme in the standard model

P. Rastegari; M. Berenjkoub

Volume 9, Issue 1 , January 2017, , Pages 3-16

http://dx.doi.org/10.22042/isecure.2017.70117.368

Abstract
  Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. ...  Read More

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

S. Mashhadi

Volume 7, Issue 2 , July 2015, , Pages 91-99

http://dx.doi.org/10.22042/isecure.2016.7.2.2

Abstract
  A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. ...  Read More

A traceable optimistic fair exchange protocol in the standard model

R. Ganjavi; M. Rajabzadeh Asaar; M. Salmasizadeh

Volume 7, Issue 1 , January 2015, , Pages 3-14

http://dx.doi.org/10.22042/isecure.2015.7.1.2

Abstract
  An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, ...  Read More