Results 31 to 40 of about 197,054 (272)

Identity-Based Aggregate Signatures [PDF]

open access: yes, 2006
An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer Si signed message Mi, where the n signers and n messages may all be distinct. The main motivation of aggregate signatures is compactness. However, while the aggregate signature itself may be compact, aggregate signature verification might require
Craig Gentry, Zulfikar Ramzan
openaire   +1 more source

Strategic group lending for banks [PDF]

open access: yes, 2018
Credit institutions often refuse to lend money to small firms. Usually, this happens because small firms are not able to provide collateral to lenders. Moreover, given the small amount of required loans, the relative cost of full monitoring is too high
Marco, Spallone, Mure', Pina
core   +3 more sources

Forward Secure Sequential Aggregate Signature Schemes on Lattice

open access: yesJisuanji kexue yu tansuo, 2021
The forward secure sequential aggregate (Fss-Agg) signature has the advantages of forward secure signature and the sequential aggregate signature at the same time. Since its proposal in 2007, it has been widely applied in many application scenarios, such
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj   +1 more source

Adaptive data synchronization algorithm for IoT-oriented low-power wide-area networks [PDF]

open access: yes, 2018
The Internet of Things (IoT) is by now very close to be realized, leading the world towards a new technological era where people’s lives and habits will be definitively revolutionized.
Biagi, Mauro   +5 more
core   +1 more source

Certificateless-based efficient aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2015
The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the ...
Yu-lei ZHANG   +4 more
doaj   +2 more sources

Certificateless Short Aggregate Signature Scheme for Mobile Devices

open access: yesIEEE Access, 2019
Today, data is exploding. A large amount of data needs to be processed in a timely and an efficient manner. Aggregate signatures are an efficient and secure way to handle large numbers of digital signatures. In an aggregate signature scheme, n signatures
Lunzhi Deng, Yixian Yang, Yuling Chen
doaj   +1 more source

Improved Fault-Tolerant Aggregate Signatures

open access: yesThe Computer Journal, 2019
Fault-tolerant aggregate signatures allow the verification algorithm to recognize and verify all the valid individual signatures in an aggregate signature. However, in ordinary aggregate signature schemes, if there is a single faulty individual signature in the valid aggregate, the whole aggregate will be invalid.
Gaoli Wang, Zhenfu Cao, Xiaolei Dong
openaire   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”

open access: yesIEEE Access
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj   +1 more source

A certificateless aggregate signature scheme for security and privacy protection in VANET

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy