Results 221 to 230 of about 49,363 (243)
Some of the next articles are maybe not open access.

Sequential Half-Aggregation of Lattice-Based Signatures

With Dilithium and Falcon, NIST selected two lattice-based signature schemes during their post-quantum standardization project. Whereas Dilithium follows the Fiat-Shamir with Aborts (Lyubashevsky, Asiacrypt’09) blueprint, Falcon can be seen as an optimized version of the GPV-paradigm (Gentry et al., STOC’06).
Katharina Boudgoust, Akira Takahashi
openaire   +3 more sources

Alternative Formalization and Implementation of Sequential Aggregate Signatures

2009 Second International Workshop on Computer Science and Engineering, 2009
This paper studies the construction of sequential aggregate signatures from any existentially unforgeable digital signature scheme and investigates whether the security of a sequential aggregate signature in this signature-based framework can be reduced to that of the underlying signatures.
openaire   +1 more source

From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption

2020
An aggregate signature allows one to generate a short aggregate of signatures from different signers on different messages. A sequential aggregate signature (SeqAS) scheme allows the signers to aggregate their individual signatures in a sequential manner.
Sanjit Chatterjee, R. Kabaleeshwaran
openaire   +1 more source

Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures

2017
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where an attacker has broken into the system.
Hartung, Gunnar   +4 more
openaire   +2 more sources

On-Line Signature Verification Using Symbolic Aggregate Approximation (SAX) and Sequential Mining Optimization (SMO)

2014 13th International Conference on Machine Learning and Applications, 2014
Signatures are the single most widely used method of identifying an individual but they carry with them an alarmingly significant number of vulnerabilities, implying the need for an effective and robust method of precisely identifying an individual's signature. The signature of an individual is visually acquired by using a pen-based tracking system [1],
Rakesh Deivachilai, Tim Oates
openaire   +1 more source

A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures

2018
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over large domains, which have recently been shown to be realizable in the random oracle model.
Craig Gentry   +2 more
openaire   +1 more source

More Efficient Trapdoor-Permutation-Based Sequential Aggregate Signatures with Lazy Verification

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020
Jiaqi ZHAI, Jian LIU, Lusheng CHEN
openaire   +1 more source

Certificateless aggregate signature scheme secure against fully chosen-key attacks

Information Sciences, 2020
Ge Wu, Limin Shen, Fuchun Guo
exaly  

CLAST: Efficient Certificateless Sequential Aggregate Signature Scheme for Industrial Internet of Things Environments

2023 IEEE 11th International Conference on Information, Communication and Networks (ICICN), 2023
Siqi Yang   +6 more
openaire   +1 more source

Home - About - Disclaimer - Privacy