Results 241 to 250 of about 5,821 (279)
Some of the next articles are maybe not open access.
Security Model for Certificateless Aggregate Signature Schemes
2008 International Conference on Computational Intelligence and Security, 2008Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one.
Lei Zhang, Futai Zhang
openaire +1 more source
Comparing two pairing-based aggregate signature schemes
Designs, Codes and Cryptography, 2009This paper describes detailed security and performance comparisons of two aggregate signature schemes. The first (BGLS), due to \textit{D. Boneh, C. Gentry, B. Lynn} and \textit{H. Shacham} [Eurocrypt 2003, Lect. Notes Comput. Sci. 2656, 416--432 (2003; Zbl 1038.94553)], uses bilinear pairings and has a reductionist security proof assuming the random ...
Chatterjee, Sanjit +3 more
openaire +1 more source
Unrestricted and compact certificateless aggregate signature scheme
Information Sciences, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Keitaro Hashimoto, Wakaha Ogata
openaire +2 more sources
A Sanitizable Signature Scheme with Aggregation
2007A sanitizable signature scheme is a digital signature scheme in which, after generating a signer's signature on a document, specific entities (called sanitizers) can modify the document for hiding partial information. A verifier can confirm the integrity of disclosed parts of the sanitized document from the signature. The sanitizable signature is quite
Tetsuya Izu +4 more
openaire +1 more source
Aggregate Signature Consensus Scheme Based on FPGA
2019With the rapid development of cryptocurrency, such as the Bitcoin, block chain technology, as the bottom technology of Bitcoin, has been widely concerned by researchers. Block chain has the characteristics of decentralization, anonymity and non-tampering, which realizes the transformation from social trust to machine trust.
Jinhua Fu +5 more
openaire +1 more source
Provably Secure Identity-Based Aggregate Signature Scheme
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length.
openaire +1 more source
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
2016(Sequential) Aggregate signature schemes enable a group of users \(u_1, \dots , u_k\) with messages \(m_1, \dots , m_k\) to produce a single signature \(\varSigma \) which states the integrity and authenticity of all the messages \(m_1, \dots , m_k\).
El Bansarkhani, Rachid +2 more
openaire +1 more source
Certificateless Sequential Aggregate Signature Scheme on NTRU Lattice
Chinese Journal of Electronics, 2019Having the advantages of certificateless signature and the aggregate signature at the same time, certificateless aggregate signature has been widely applied in e-business, e-government and software security since it was proposed in 2007. Although a number of certificateless aggregate signature schemes have been proposed, all of them are based on the ...
Jia XIE +3 more
openaire +1 more source
An Aggregate Signature Scheme with Constant Pairing Operations
2008 International Conference on Computer Science and Software Engineering, 2008We propose a new aggregate signature scheme from bilinear pairings. It requires constant pairing operations in the verification and the size of aggregate signature is independent of the number of signers. In the public key infrastructure (PKI) setting, it is the first aggregate signature scheme with these properties.
Yiling Wen, Jianfeng Ma
openaire +1 more source
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature
2020Multivariate public key cryptography which relies on multivariate quadratic (MQ) problem is one of the main approaches to guarantee the security of communication in the post-quantum world. In this paper, we focus mainly on the yet unbroken (under proper parameter choice) Unbalanced Oil and Vinegar (UOV) scheme, and discuss the exact security of it ...
Jiahui Chen +4 more
openaire +1 more source

