Results 11 to 20 of about 49,363 (243)

Sequential aggregate signatures with short public keys without random oracles

open access: yesTheoretical Computer Science, 2015
The notion of aggregate signature has been motivated by applications and it enables any user to compress different signatures signed by different signers on different messages into a short signature. Sequential aggregate signature, in turn, is a special kind of aggregate signature that only allows a signer to add his signature into an aggregate ...
Kwangsu Lee, Dong Hoon Lee, Moti Yung
openaire   +4 more sources

Sequential Aggregate Signatures Made Shorter [PDF]

open access: yes, 2013
Sequential aggregate signature (SAS) is a special type of public-key signature that allows a signer to add his signature into a previous aggregate signature in sequential order. In this case, since many public keys are used and many signatures are employed and compressed, it is important to reduce the sizes of signatures and public keys.
Kwangsu Lee, Dong Hoon Lee, Moti Yung
openaire   +1 more source

History-Free Sequential Aggregate Signatures [PDF]

open access: yes, 2012
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion of unforgeability is preserved. Recently, Eikemeier et al. (SCN 2010) considered the notion of history-free sequential aggregation for message authentication codes, where the ...
Marc Fischlin   +2 more
openaire   +1 more source

Sequential aggregate signatures with lazy verification from trapdoor permutations [PDF]

open access: yesInformation and Computation, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brogle, Kyle   +2 more
openaire   +2 more sources

Ultrafast fluorescent decay induced by metal-mediated dipole-dipole interaction in two-dimensional molecular aggregates [PDF]

open access: yes, 2016
Two-dimensional molecular aggregate (2DMA), a thin sheet of strongly interacting dipole molecules self-assembled at close distance on an ordered lattice, is a fascinating fluorescent material.
Fang, Nicholas X   +7 more
core   +3 more sources

ID-Based Sequential Aggregate Signatures

open access: yesJournal of Software, 2011
An aggregate signature provides a method for combining n signatures of n different messages from n different signers into one signature of unit length. The main benefit of such schemes is that they allow bandwidth and computational savings.
Xiangguo Cheng   +3 more
openaire   +1 more source

Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network

open access: yesSensors, 2019
Wireless body area networks (WBANs) are expected to play a vital role in the field of patient-health monitoring shortly. They provide a convenient way to collect patient data, but they also bring serious problems which are mainly reflected in the safe ...
Yongjun Ren   +4 more
doaj   +1 more source

Sequential Aggregate Signatures from Trapdoor Permutations [PDF]

open access: yes, 2004
An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and Shacham) is a method for combining n signatures from n different signers on n different messages into one signature of unit length. We propose sequential aggregate signatures, in which the set of signers is ordered. The aggregate signature is computed by having each signer, in
Anna Lysyanskaya   +3 more
openaire   +1 more source

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]

open access: yes, 2016
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan   +8 more
core   +3 more sources

ISDSR+: Improving the Security and Availability of Secure Routing Protocol

open access: yesIEEE Access, 2019
In ad hoc networks that allow devices to dynamically configure networks via wireless communication, a secure routing protocol is a technology that guarantees the validity of routing with the use of cryptographic authentication.
Hideharu Kojima   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy