Security Analysis of Two Lightweight Certificateless Signature Schemes
1. Security Analysis of Two Lightweight Certificateless Signature Schemes

Nasrollah Pakniat

Volume 5, Issue 2 , Summer and Autumn 2018, , Pages 59-65

http://dx.doi.org/10.22108/jcs.2019.110889.

Abstract
  Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography ...  Read More
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
2. Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Nasrollah Pakniat; Ziba Eslami

Volume 4, Issue 1 , Winter and Spring 2017, , Pages 3-12

http://dx.doi.org/10.22108/jcs.2018.108395.

Abstract
  Social secret sharing, introduced in 2010 by Nojoumian et al., allows to share a secret among a set of participants whose authorities can vary over time. However, existing social secret ...  Read More