33 Hits in 13.9 sec

Group Signature with Verifier-Local Revocation Based on Coding Theory

Luping Wang, Kai Zhang, Haifeng Qian, Jie Chen, Jin Wook Byun
2021 Security and Communication Networks  
Group signature with verifier-local revocation (VLR-GS) is a special variant of revocable group signature that not only allows a user to anonymously sign messages but also only requires the verifiers to  ...  To obtain the scheme, we first introduce a new code-based Stern-like interactive zero-knowledge protocol with member revocation mechanism based on syndrome decoding problem.  ...  Our main contribution is to give a generic construction for the code-based group signature scheme with support of verifier-local revocation function.  ... 
doi:10.1155/2021/3259767 fatcat:kvgyoxi3h5gl3kqz2uaonrowwe

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
2022 Cryptography  
Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings.  ...  We selected many papers that discuss balancing user tracing and anonymity in group and ring signatures.  ...  In group signature schemes with verifier-local revocation [29, 39, 41, 89] , a token determines the users' revocation status.  ... 
doi:10.3390/cryptography6010003 fatcat:dby2hr4g4zhqtemdm3tm43552u

Foundations of Fully Dynamic Group Signatures

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
2020 Journal of Cryptology  
Group signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager.  ...  For group signatures to be applicable in practice, they need to support fully dynamic groups, i.e., users may join and leave at any time.  ...  verifier-local revocation and linkable group signatures out of scope.  ... 
doi:10.1007/s00145-020-09357-w fatcat:cbboijkhafbifhlsbks2lkf4qu

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are  ...  The authors presented a group signature scheme from lattice assumptions.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

A Survey of Provably Secure Searchable Encryption

Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter
2014 ACM Computing Surveys  
User revocation. An important requirement that comes with the multireader schemes is user revocation.  ...  with keyword search (PEKS).  ...  ACKNOWLEDGMENTS The authors would like to thank Luan Ibraimi, Arjan Jeckmans, Eleftheria Makri, and the anonymous reviewers for their insightful comments.  ... 
doi:10.1145/2636328 fatcat:3ho3qfcufjhopgigvlvh7qwkem

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The user thereof uses the information at its sole risk and liability. References  ...  Note that depending on the WSN design, local revocation could be insufficient.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies.  ...  The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications.  ...  The recipient can use the public key of the sender, to verify, if message and signature match with respect to the public key.  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Program book

2010 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)  
The MhR-tree is based on the R-tree augmented with the min-wise signature and the linear hashing technique.  ...  This resulted in a research program committee consisting of almost 230 members in total, with an average review load of around 7 papers.  ...  Online Social networking services of all flavors have grown remarkably in a short span of time, with millions of users creating and sharing a vast amount of data ranging from blog entries, bookmarks, pictures  ... 
doi:10.1109/icdew.2010.5452773 fatcat:oyq2tujbvjfpxjlyixux5q57vu

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+70 others)
2015 International Journal of Network Security   unpublished
The drawback results from the deterministic encryption used. To fix it, we suggest to replace the deterministic encryption with a probabilistic encryption.  ...  This property has been explicitly specified in the earlier works by Rabin, Even, Goldreich and Lempel.  ...  Acknowledgments Acknowledgments The authors thank the editors and the anonymous referees for their valuable comments and suggestions. This  ... 

Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019

Naseem Naqvi
2019 The Journal of British Blockchain Association  
other lattice-based signature schemes.  ...  After security, the performance was the next most important criterion in selecting the second-round candidates [3] . qTESLA is a lattice-based signature scheme which uses the assumption that RLWE distributions  ...  In this game, the users own cats that have certain attributes, like colour or weird features like wings. The cats can mate with each other creating new cats with unique combinations of attributes.  ... 
doi:10.31585/jbba-2-2-(full)2019 fatcat:lsnv4wnuhvhpne33puatdc4p4e

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  and the content that is requested if local storage available locally placement if not distribute the content into respected group members.  ...  Users moving with similar speed and direction will form groups. A group with high mobility will have a link to the content router, and low mobility will get their videos from the base station.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+93 others)
2017 An Investigation on Biometric Internet Security International Journal of Network Security   unpublished
electronic data storage and high transfer based devices, e-commerce, e-security, e-governance, and e-business.  ...  The Internet revolution is also emerged as significant challenge due to the threats of hacking systems and individual accounts, mal-ware, fraud and vulnerabilities of system and networks, etc.  ...  Acknowledgments The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER  ... 

*Inform atica An International Journal of Computing and Informatics pecial Issue: Cryptology and Network Security Guest Editors

Francesco Bergadano, Chuan-Kun Wu
2002 unpublished
Acknowledgements The authors acknovvledge the support of the British Telecommunications plc. who funded this work and the help of the subjects who took part in the empirical study.  ...  If a group member has generated two group signatures, the verifier cannot find any connection betvveen them. -Revocation. Group manager can find who is the signer of a group signature when needed.  ...  The group public key can be used to encrypt a message and aH legitimate group members can decrypt it. The group public key is also used to verify a group signature from any member of the group. Y.  ... 

Strengthening trust in the identity life cycle [article]

Nicolas Buchmann, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
Furthermore, simpler travel document protocols with less complex infrastructure requirements, fewer steps, and long-term post-quantum security achieved via hash-based cryptography and code-based cryptography  ...  The security of birth certificates is strengthened by a blockchain based system and a 2D barcode which stores biometric information.  ...  Passive Authentication verifies the authenticity and integrity of the eMRTD data groups via a digital signature by verifying a digital signature created during document personalisation from the document  ... 
doi:10.17169/refubium-1829 fatcat:23mb2ng5j5hddgpbmldt5xylfm

Secure fingerprinting on sound foundations [article]

Ahmad-Reza Sadeghi, Universität Des Saarlandes, Universität Des Saarlandes
Based on the first thorough classification of assumptions related to discrete logarithms, this thesis gives novel insights into the relations between these assumptions.  ...  scheme which fulfills advanced security requirements such as collusion-tolerance, asymmetry, anonymity and direct non-repudiation.  ...  Another approach by Camenisch (2000) for constructing an anonymous fingerprinting scheme with direct non-repudiation is based on group signatures.  ... 
doi:10.22028/d291-25727 fatcat:axpwgdcw2jfu7kfk2wdaojeztq
« Previous Showing results 1 — 15 out of 33 results