Results 231 to 240 of about 197,054 (272)
Some of the next articles are maybe not open access.
Improved heterogeneous aggregation signature scheme
2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), 2020The heterogeneous aggregate signcryption scheme can authenticate the signatures of multiple messages, thereby ensuring the authenticity of the messages. And this technology also solves the communication problem under different cryptosystems. However, most of the current schemes have hidden dangers of insecurity, and the signcryption may be forged ...
Shijin Li +3 more
openaire +1 more source
An Improved Certificateless Aggregate Signature
2014 IEEE International Conference on Computer and Information Technology, 2014Recently, Hou et al. Proposed an improved certificate less aggregate signature (CLASS) scheme based on Xiong et al's scheme. They also demonstrated the scheme is provably secure in the random oracle model. Unfortunately, by giving concrete attacks, we point out that Hou et al.'s scheme is not secure in their security model. Then, we propose an improved
Jiang Deng +3 more
openaire +1 more source
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
2007An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer i signed message mi, where the n signers and n messages are distinct. The main motivation of aggregate signatures is compactness. In this paper, the concept of aggregate proxy signature (APS) is first proposed to compact the proxy signatures ...
Jin Li +3 more
openaire +1 more source
Cryptanalysis and Improvement for Certificateless Aggregate Signature
Fundamenta Informaticae, 2018In order to satisfy application in resource constrained environment, aggregate signature schemes have been widely investigated. Recently, He et al. pointed out that certificateless aggregate signature (CLAS) scheme proposed by Xiong et al. was insecure against the Type II adversary and presented an possible improvement.
Li, Jiguo, Yuan, Hong, Zhang, Yichen
openaire +2 more sources
Towards Lattice Based Aggregate Signatures
2014We propose the first lattice-based sequential aggregate signature (SAS) scheme that is provably secure in the random oracle model. As opposed to factoring and number theory based systems, the security of our construction relies on worst-case lattice problems. Generally speaking, SAS schemes enable any group of signers ordered in a chain to sequentially
Rachid El Bansarkhani, Johannes Buchmann
openaire +1 more source
Journal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lu, Steve +4 more
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lu, Steve +4 more
openaire +1 more source
A new certificateless aggregate signature scheme
Computer Communications, 2009Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes.
Lei Zhang, Futai Zhang
openaire +1 more source
Aggregating Falcon Signatures with LaBRADOR
Several prior works have suggested to use non-interactive arguments of knowledge with short proofs to aggregate signatures of Falcon, which is part of the first post-quantum signatures selected for standardization by NIST. Especially LaBRADOR, based on standard structured lattice assumptions and published at CRYPTO’23, seems promising to realize this ...Aardal, Marius A. +4 more
openaire +3 more sources
Some aggregate forward-secure signature schemes
TENCON 2008 - 2008 IEEE Region 10 Conference, 2008Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy. Forward-secure digital signatures address this weakness, they ensure that the past signatures remain secure even if the current secret key is leaked.
N.R. Sunitha, B.B. Amberker
openaire +1 more source
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures
2021Aggregate signature schemes enable us to aggregate multiple signatures into a single short signature. One of its typical applications is sensor networks, where a large number of users and devices measure their environments, create signatures to ensure the integrity of the measurements, and transmit their signed data. However, if an invalid signature is
Ryu Ishii +7 more
openaire +1 more source

