Results 1 to 10 of about 5,702 (160)

Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations [PDF]

open access: goldThe Scientific World Journal, 2014
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj   +4 more sources

Efficient unrestricted identity-based aggregate signature scheme. [PDF]

open access: yesPLoS ONE, 2014
An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation.
Yumin Yuan, Qian Zhan, Hua Huang
doaj   +5 more sources

On the Security of Some Aggregate Signature Schemes [PDF]

open access: goldJournal of Applied Mathematics, 2012
Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectively.
Baoyuan Kang
doaj   +6 more sources

An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things [PDF]

open access: goldSensors, 2019
With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applications ...
Hong Shu   +5 more
doaj   +4 more sources

Security analysis of the unrestricted identity-based aggregate signature scheme. [PDF]

open access: goldPLoS ONE, 2015
Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full ...
Kwangsu Lee, Dong Hoon Lee
doaj   +4 more sources

A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments [PDF]

open access: goldSensors, 2020
The Internet of Things (IoT) environment consists of numerous devices. In general, IoT devices communicate with each other to exchange data, or connect to the Internet through a gateway to provide IoT services.
Dae-Hwi Lee, Kangbin Yim, Im-Yeong Lee
doaj   +5 more sources

LMQSAS - post-quantum aggregate signature scheme with lazy verification

open access: diamondБезопасность информационных технологий, 2023
Aggregated signatures are a type of digital signatures that allow individual signatures obtained by different signers for different messages to be combined into a single signature that provides authenticity, integrity, and non-repudiation for all signed ...
Artyom O. Makarov
doaj   +4 more sources

Security Analysis and Improvement of a Sever-aided Aggregate Verification Signature Scheme [PDF]

open access: greenJisuanji gongcheng, 2017
To improve the security of server-aided aggregate verification signature,a new security model of server-aided aggregate verification signature against collusion and adaptive chosen message attacks is presented.It analyzes the security of server-aided ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +2 more sources

A New Certificateless Aggregate Signature Scheme [PDF]

open access: greenJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +2 more sources

Cryptanalysis of a certificateless aggregate signature scheme [PDF]

open access: green2016 International Conference on Computing, Communication and Automation (ICCCA), 2016
Certificateless aggregate signature allows mapping n signatures on n distinct messages from n distinct users into a single length signature. Recently Deng et al proposed CLAS Scheme which is an improvement of Hou et al scheme and claims that their scheme is secure against type II adversary but unfortunately it is found unsecure by applying the Honest ...
Nasrollah Pakniat, Mahnaz Noroozi
  +4 more sources

Home - About - Disclaimer - Privacy