Results 1 to 10 of about 196,935 (153)

Security analysis of the unrestricted identity-based aggregate signature scheme. [PDF]

open access: yesPLoS ONE, 2015
Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full ...
Kwangsu Lee, Dong Hoon Lee
doaj   +5 more sources

Efficient unrestricted identity-based aggregate signature scheme. [PDF]

open access: yesPLoS ONE, 2014
An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation.
Yumin Yuan, Qian Zhan, Hua Huang
doaj   +5 more sources

Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations [PDF]

open access: yesThe Scientific World Journal, 2014
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj   +2 more sources

A short certificateless aggregate signature against coalition attacks. [PDF]

open access: yesPLoS ONE, 2018
Certificateless aggregate signature (CLAS) is a crucial cryptosystem. It can not only compress multiple signatures into a short signature, but also ensure the validity of each signature participating in the aggregation by verifying the validity of an ...
Xiaodong Yang   +4 more
doaj   +2 more sources

An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things [PDF]

open access: yesSensors, 2019
With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applications ...
Hong Shu   +5 more
doaj   +2 more sources

A lightweight certificateless aggregate signature scheme without pairing for VANETs [PDF]

open access: yesScientific Reports
In the secure vehicular ad-hoc networks (VANETs), certificateless aggregate signature schemes(CLAS) have attracted more and more attention because they can efficiently implement message aggregation and authentication without complex certificate ...
Qiuling Yue, Weijian Jiang, Hong Lei
doaj   +2 more sources

An Efficient SM9 Aggregate Signature Scheme for IoV Based on FPGA [PDF]

open access: yesSensors
With the rapid development of the Internet of Vehicles (IoV), the demand for secure and efficient signature verification is becoming increasingly urgent.
Bolin Zhang   +6 more
doaj   +2 more sources

On the Security of Some Aggregate Signature Schemes [PDF]

open access: yesJournal of Applied Mathematics, 2012
Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively.
Baoyuan Kang
doaj   +4 more sources

Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations [PDF]

open access: yesEntropy
Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times.
Minghui Zheng   +5 more
doaj   +2 more sources

On Key Substitution Attacks Against Aggregate Signatures and Multi-Signatures

open access: yesIEEE Access
The most fundamental security requirement for signature schemes is unforgeability, which guarantees that no one can create a valid signature on a message without the secret signing key.
Yuuki Fujita   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy