Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations [PDF]
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj +4 more sources
Efficient unrestricted identity-based aggregate signature scheme. [PDF]
An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation.
Yumin Yuan, Qian Zhan, Hua Huang
doaj +5 more sources
On the Security of Some Aggregate Signature Schemes [PDF]
Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively.
Baoyuan Kang
doaj +6 more sources
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things [PDF]
With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applications ...
Hong Shu +5 more
doaj +4 more sources
Security analysis of the unrestricted identity-based aggregate signature scheme. [PDF]
Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full ...
Kwangsu Lee, Dong Hoon Lee
doaj +4 more sources
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments [PDF]
The Internet of Things (IoT) environment consists of numerous devices. In general, IoT devices communicate with each other to exchange data, or connect to the Internet through a gateway to provide IoT services.
Dae-Hwi Lee, Kangbin Yim, Im-Yeong Lee
doaj +5 more sources
LMQSAS - post-quantum aggregate signature scheme with lazy verification
Aggregated signatures are a type of digital signatures that allow individual signatures obtained by different signers for different messages to be combined into a single signature that provides authenticity, integrity, and non-repudiation for all signed ...
Artyom O. Makarov
doaj +4 more sources
Security Analysis and Improvement of a Sever-aided Aggregate Verification Signature Scheme [PDF]
To improve the security of server-aided aggregate verification signature,a new security model of server-aided aggregate verification signature against collusion and adaptive chosen message attacks is presented.It analyzes the security of server-aided ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj +2 more sources
A New Certificateless Aggregate Signature Scheme [PDF]
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj +2 more sources
Cryptanalysis of a certificateless aggregate signature scheme [PDF]
Certificateless aggregate signature allows mapping n signatures on n distinct messages from n distinct users into a single length signature. Recently Deng et al proposed CLAS Scheme which is an improvement of Hou et al scheme and claims that their scheme is secure against type II adversary but unfortunately it is found unsecure by applying the Honest ...
Nasrollah Pakniat, Mahnaz Noroozi
+4 more sources

