LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT [PDF]
Aiming at the challenge that traditional signature schemes struggle to simultaneously achieve efficiency, resistance to quantum attacks, and privacy protection, this paper proposes a lattice-based conditional privacy-preserving certificateless aggregate ...
Lin Shi +4 more
doaj +2 more sources
Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model
In the forward secure sequential aggregate (FssAgg) signature scheme, the signer combines signatures generated in different intervals under different secret keys incrementally and sequentially in a layered “onion-like” fashion with the first signature ...
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj +1 more source
Security Analysis and Improvement of a Sever-aided Aggregate Verification Signature Scheme [PDF]
To improve the security of server-aided aggregate verification signature,a new security model of server-aided aggregate verification signature against collusion and adaptive chosen message attacks is presented.It analyzes the security of server-aided ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj +1 more source
Provably Secure Linearly Homomorphic Aggregate Signature Scheme for Electronic Healthcare System
In recent years, deploying Internet of Things (IoT) in electronic healthcare systems (EHS) has made great progress in healthcare detection. It is extremely important to reduce the cost of communication and ensure the authenticity and integrity of data. A
Yanyan Gu +3 more
doaj +1 more source
A New Certificateless Aggregate Signature Scheme [PDF]
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Cryptanalysis of a certificateless aggregate signature scheme [PDF]
Certificateless aggregate signature allows mapping n signatures on n distinct messages from n distinct users into a single length signature. Recently Deng et al proposed CLAS Scheme which is an improvement of Hou et al scheme and claims that their scheme is secure against type II adversary but unfortunately it is found unsecure by applying the Honest ...
Pankaj Kumar +2 more
openaire +2 more sources
Insecurity of a certificateless aggregate signature scheme [PDF]
AbstractAs an important kind of digital signature, the aggregate signature could aggregate n signatures into a signature and verify those signatures simultaneously. It is suitable for the constrained environment with limited ability of computation and communication. Recently, Chen et al.
Han SHEN +3 more
openaire +2 more sources
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification [PDF]
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing.
Keoh, Sye Loong, Tang, Zhaohui
core +1 more source
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources

