Unrestricted Aggregate Signatures [PDF]
Secure use of the BGLS [1] aggregate signature schemes is restricted to the aggregation of distinct messages (for the basic scheme) or per-signer distinct messages (for the enhanced, prepend-public-key version of the scheme). We argue that these restrictions preclude interesting applications, make usage of the schemes error-prone and are generally ...
Mihir Bellare +2 more
openaire +1 more source
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification [PDF]
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing.
Keoh, Sye Loong, Tang, Zhaohui
core +1 more source
Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou +7 more
core +4 more sources
Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj +1 more source
A Program Logic for Verifying Secure Routing Protocols [PDF]
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP).
Chen, Chen +5 more
core +5 more sources
Signature Bouquets: Immutability for Aggregated/Condensed Signatures [PDF]
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. Since a service provider is almost never fully trusted, security and privacy of outsourced data are important concerns.
Einar Mykletun +2 more
openaire +1 more source
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method
An aggregate signature turns multi-message multi-authentication into multi-message single-authentication, reducing the required storage space, transmission cost, and number of verification calculations, and is suitable for fast message authentication in ...
Xiuhua Lu +4 more
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Whole tumor RNA-sequencing and deconvolution reveal a clinically-prognostic PTEN/PI3K-regulated glioma transcriptional signature [PDF]
The concept that solid tumors are maintained by a productive interplay between neoplastic and non-neoplastic elements has gained traction with the demonstration that stromal fibroblasts and immune system cells dictate cancer development and progression ...
Bush, Erin C +6 more
core +2 more sources
KISS: Stochastic Packet Inspection Classifier for UDP Traffic [PDF]
This paper proposes KISS, a novel Internet classifica- tion engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of Peer-to-Peer (P2P) streaming appli- cations, we propose a novel classification framework that leverages ...
Finamore, Alessandro +3 more
core +2 more sources

