Results 221 to 230 of about 49,363 (243)
Some of the next articles are maybe not open access.
Sequential Half-Aggregation of Lattice-Based Signatures
With Dilithium and Falcon, NIST selected two lattice-based signature schemes during their post-quantum standardization project. Whereas Dilithium follows the Fiat-Shamir with Aborts (Lyubashevsky, Asiacrypt’09) blueprint, Falcon can be seen as an optimized version of the GPV-paradigm (Gentry et al., STOC’06).Katharina Boudgoust, Akira Takahashi
openaire +3 more sources
Alternative Formalization and Implementation of Sequential Aggregate Signatures
2009 Second International Workshop on Computer Science and Engineering, 2009This paper studies the construction of sequential aggregate signatures from any existentially unforgeable digital signature scheme and investigates whether the security of a sequential aggregate signature in this signature-based framework can be reduced to that of the underlying signatures.
openaire +1 more source
2020
An aggregate signature allows one to generate a short aggregate of signatures from different signers on different messages. A sequential aggregate signature (SeqAS) scheme allows the signers to aggregate their individual signatures in a sequential manner.
Sanjit Chatterjee, R. Kabaleeshwaran
openaire +1 more source
An aggregate signature allows one to generate a short aggregate of signatures from different signers on different messages. A sequential aggregate signature (SeqAS) scheme allows the signers to aggregate their individual signatures in a sequential manner.
Sanjit Chatterjee, R. Kabaleeshwaran
openaire +1 more source
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
2017Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where an attacker has broken into the system.
Hartung, Gunnar +4 more
openaire +2 more sources
2014 13th International Conference on Machine Learning and Applications, 2014
Signatures are the single most widely used method of identifying an individual but they carry with them an alarmingly significant number of vulnerabilities, implying the need for an effective and robust method of precisely identifying an individual's signature. The signature of an individual is visually acquired by using a pen-based tracking system [1],
Rakesh Deivachilai, Tim Oates
openaire +1 more source
Signatures are the single most widely used method of identifying an individual but they carry with them an alarmingly significant number of vulnerabilities, implying the need for an effective and robust method of precisely identifying an individual's signature. The signature of an individual is visually acquired by using a pen-based tracking system [1],
Rakesh Deivachilai, Tim Oates
openaire +1 more source
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
2018We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over large domains, which have recently been shown to be realizable in the random oracle model.
Craig Gentry +2 more
openaire +1 more source
An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System
IEEE Internet of Things Journal, 2021Wenjie Yang, Yi Mu
exaly
More Efficient Trapdoor-Permutation-Based Sequential Aggregate Signatures with Lazy Verification
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020Jiaqi ZHAI, Jian LIU, Lusheng CHEN
openaire +1 more source
Certificateless aggregate signature scheme secure against fully chosen-key attacks
Information Sciences, 2020Ge Wu, Limin Shen, Fuchun Guo
exaly
2023 IEEE 11th International Conference on Information, Communication and Networks (ICICN), 2023
Siqi Yang +6 more
openaire +1 more source
Siqi Yang +6 more
openaire +1 more source

