I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +3 more sources
Provably Unforgeable Signatures [PDF]
Very strong definitions of security for signature schemes have been proposed in the literature. Constructions for such schemes have been proposed, but so far they have only been of theoretical interest and have been considered far too inefficient for practical use.Here we present a new scheme that satisfies these strongest definitions and uses ...
Jurjen N. E. Bos, David Chaum
openaire +1 more source
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based
Hongfei Zhu +5 more
doaj +1 more source
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing [PDF]
To ensure the privacy of users in transport systems, researchers are working on new protocols providing the best security guarantees while respecting functional requirements of transport operators.
Arfaoui, Ghada +5 more
core +6 more sources
Two-Round Multi-Signatures from Okamoto Signatures
Multi-signatures (MS) are a special type of public-key signature (PKS) in which multiple signers participate cooperatively to generate a signature for a single message. Recently, applications that use an MS scheme to strengthen the security of blockchain
Kwangsu Lee, Hyoseung Kim
doaj +1 more source
Anonymous Single-Sign-On for n designated services with traceability [PDF]
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations.
CI Fan +26 more
core +2 more sources
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model [PDF]
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience), including the random ...
Buus Nielsen, Jesper +2 more
core +2 more sources
Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings
With the emergence of mobile communication technologies, we are entering the fifth generation (5G) mobile communication system era. Various application scenarios will arise in the 5G era to meet the different service requirements.
Jingwei Liu +4 more
doaj +1 more source
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information [PDF]
Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or ...
C Olston +6 more
core +3 more sources
Unforgiveness, rumination, and depressive symptoms among older adults [PDF]
The experience of feeling unforgiven for past transgressions may contribute to depressive symptoms in later life. This article tests a model in which feeling unforgiven by God and by other people have direct effects on depressive symptoms while self-unforgiveness and rumination mediate this relationship.
Berit, Ingersoll-Dayton +2 more
openaire +2 more sources

