Results 11 to 20 of about 85,247 (258)

LCP-CAS: Lattice-Based Conditional Privacy-Preserving Certificateless Aggregation Signature Scheme for Industrial IoT [PDF]

open access: yesEntropy
Aiming at the challenge that traditional signature schemes struggle to simultaneously achieve efficiency, resistance to quantum attacks, and privacy protection, this paper proposes a lattice-based conditional privacy-preserving certificateless aggregate ...
Lin Shi   +4 more
doaj   +2 more sources

Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model

open access: yesJisuanji kexue yu tansuo, 2021
In the forward secure sequential aggregate (FssAgg) signature scheme, the signer combines signatures generated in different intervals under different secret keys incrementally and sequentially in a layered “onion-like” fashion with the first signature ...
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj   +1 more source

Security Analysis and Improvement of a Sever-aided Aggregate Verification Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
To improve the security of server-aided aggregate verification signature,a new security model of server-aided aggregate verification signature against collusion and adaptive chosen message attacks is presented.It analyzes the security of server-aided ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +1 more source

Provably Secure Linearly Homomorphic Aggregate Signature Scheme for Electronic Healthcare System

open access: yesMathematics, 2022
In recent years, deploying Internet of Things (IoT) in electronic healthcare systems (EHS) has made great progress in healthcare detection. It is extremely important to reduce the cost of communication and ensure the authenticity and integrity of data. A
Yanyan Gu   +3 more
doaj   +1 more source

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Cryptanalysis of a certificateless aggregate signature scheme [PDF]

open access: yes2016 International Conference on Computing, Communication and Automation (ICCCA), 2016
Certificateless aggregate signature allows mapping n signatures on n distinct messages from n distinct users into a single length signature. Recently Deng et al proposed CLAS Scheme which is an improvement of Hou et al scheme and claims that their scheme is secure against type II adversary but unfortunately it is found unsecure by applying the Honest ...
Pankaj Kumar   +2 more
openaire   +2 more sources

Insecurity of a certificateless aggregate signature scheme [PDF]

open access: yesSecurity and Communication Networks, 2016
AbstractAs an important kind of digital signature, the aggregate signature could aggregate n signatures into a signature and verify those signatures simultaneously. It is suitable for the constrained environment with limited ability of computation and communication. Recently, Chen et al.
Han SHEN   +3 more
openaire   +2 more sources

Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification [PDF]

open access: yes, 2014
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing.
Keoh, Sye Loong, Tang, Zhaohui
core   +1 more source

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]

open access: yes, 2016
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan   +8 more
core   +3 more sources

Home - About - Disclaimer - Privacy