Results 21 to 30 of about 85,247 (258)

Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]

open access: yes, 2017
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou   +7 more
core   +4 more sources

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs

open access: yesIEEE Access, 2021
As a solution to mitigate the key exposure problems in the digital signature, the forward security has been proposed. The forward security guarantees the integrity of the messages generated in the past despite leaks of a current time period secret key by
Jeonghyuk Lee, Jihye Kim, Hyunok Oh
doaj   +1 more source

Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]

open access: yesJisuanji gongcheng, 2017
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj   +1 more source

Packing and Padding: Coupled Multi-index for Accurate Image Retrieval [PDF]

open access: yes, 2014
In Bag-of-Words (BoW) based image retrieval, the SIFT visual word has a low discriminative power, so false positive matches occur prevalently. Apart from the information loss during quantization, another cause is that the SIFT feature only describes the ...
Liu, Ziqiong   +3 more
core   +3 more sources

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments [PDF]

open access: yesSensors, 2020
The Internet of Things (IoT) environment consists of numerous devices. In general, IoT devices communicate with each other to exchange data, or connect to the Internet through a gateway to provide IoT services. Most IoT devices participating in the IoT service are lightweight devices, in which the existing cryptographic algorithm cannot be applied to ...
Dae-Hwi Lee, Kangbin Yim, Im-Yeong Lee
openaire   +3 more sources

A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method

open access: yesIEEE Access, 2018
An aggregate signature turns multi-message multi-authentication into multi-message single-authentication, reducing the required storage space, transmission cost, and number of verification calculations, and is suitable for fast message authentication in ...
Xiuhua Lu   +4 more
doaj   +1 more source

A secure Certificateless Aggregate Signature Scheme

open access: yesInternational Journal of Security and Its Applications, 2016
Aggregate signatures allow n signatures on n distinct messages from n distinct signers to be aggregated into a single signature that convinces any verifier that n signers do indeed sign the n messages, respectively. The major advantage of utilizing aggregate signatures is to address the security of data and save bandwidth and computations in sensor ...
Baoyuan Kang, Danhui Xu
openaire   +1 more source

An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size

open access: yesIEEE Access, 2023
The transformative potential of blockchain technology has resulted in its widespread adoption, bringing about numerous advantages such as enhanced data integrity, transparency, and decentralization.
Khaled Chait   +5 more
doaj   +1 more source

Certificateless-based efficient aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2015
The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the ...
Yu-lei ZHANG   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy