A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Group Signature with Verifier-Local Revocation Based on Coding Theory
2021
Security and Communication Networks
Group signature with verifier-local revocation (VLR-GS) is a special variant of revocable group signature that not only allows a user to anonymously sign messages but also only requires the verifiers to ...
To obtain the scheme, we first introduce a new code-based Stern-like interactive zero-knowledge protocol with member revocation mechanism based on syndrome decoding problem. ...
Our main contribution is to give a generic construction for the code-based group signature scheme with support of verifier-local revocation function. ...
doi:10.1155/2021/3259767
fatcat:kvgyoxi3h5gl3kqz2uaonrowwe
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
2022
Cryptography
Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings. ...
We selected many papers that discuss balancing user tracing and anonymity in group and ring signatures. ...
In group signature schemes with verifier-local revocation [29, 39, 41, 89] , a token determines the users' revocation status. ...
doi:10.3390/cryptography6010003
fatcat:dby2hr4g4zhqtemdm3tm43552u
Foundations of Fully Dynamic Group Signatures
2020
Journal of Cryptology
Group signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager. ...
For group signatures to be applicable in practice, they need to support fully dynamic groups, i.e., users may join and leave at any time. ...
verifier-local revocation and linkable group signatures out of scope. ...
doi:10.1007/s00145-020-09357-w
fatcat:cbboijkhafbifhlsbks2lkf4qu
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
2021
IEEE Access
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs. ...
Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are ...
The authors presented a group signature scheme from lattice assumptions. ...
doi:10.1109/access.2021.3062201
fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
A Survey of Provably Secure Searchable Encryption
2014
ACM Computing Surveys
User revocation. An important requirement that comes with the multireader schemes is user revocation. ...
with keyword search (PEKS). ...
ACKNOWLEDGMENTS The authors would like to thank Luan Ibraimi, Arjan Jeckmans, Eleftheria Makri, and the anonymous reviewers for their insightful comments. ...
doi:10.1145/2636328
fatcat:3ho3qfcufjhopgigvlvh7qwkem
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section ...
The user thereof uses the information at its sole risk and liability.
References ...
Note that depending on the WSN design, local revocation could be insufficient. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
D5.1 Key Technologies for IoT Data Management Benchmark
2021
Zenodo
This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies. ...
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications. ...
The recipient can use the public key of the sender, to verify, if message and signature match with respect to the public key. ...
doi:10.5281/zenodo.5084813
fatcat:ssllddbo7rda7fadthu26ajrzu
Program book
2010
2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)
The MhR-tree is based on the R-tree augmented with the min-wise signature and the linear hashing technique. ...
This resulted in a research program committee consisting of almost 230 members in total, with an average review load of around 7 papers. ...
Online Social networking services of all flavors have grown remarkably in a short span of time, with millions of users creating and sharing a vast amount of data ranging from blog entries, bookmarks, pictures ...
doi:10.1109/icdew.2010.5452773
fatcat:oyq2tujbvjfpxjlyixux5q57vu
Online) International Journal of Network Security is published both in traditional paper form
2015
International Journal of Network Security
unpublished
The drawback results from the deterministic encryption used. To fix it, we suggest to replace the deterministic encryption with a probabilistic encryption. ...
This property has been explicitly specified in the earlier works by Rabin, Even, Goldreich and Lempel. ...
Acknowledgments
Acknowledgments The authors thank the editors and the anonymous referees for their valuable comments and suggestions. This ...
fatcat:tup6p3z7pzc4dpeyn3blmj3foi
Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019
2019
The Journal of British Blockchain Association
other lattice-based signature schemes. ...
After security, the performance was the next most important criterion in selecting the second-round candidates [3] . qTESLA is a lattice-based signature scheme which uses the assumption that RLWE distributions ...
In this game, the users own cats that have certain attributes, like colour or weird features like wings. The cats can mate with each other creating new cats with unique combinations of attributes. ...
doi:10.31585/jbba-2-2-(full)2019
fatcat:lsnv4wnuhvhpne33puatdc4p4e
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture
2021
Zenodo
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis ...
and the content that is requested if local storage available locally placement if not distribute the content into respected group members. ...
Users moving with similar speed and direction will form groups. A group with high mobility will have a link to the content router, and low mobility will get their videos from the base station. ...
doi:10.5281/zenodo.5148421
fatcat:lzanqvxdlre2dh3hdhjxibdrim
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
An Investigation on Biometric Internet Security International Journal of Network Security
unpublished
electronic data storage and high transfer based devices, e-commerce, e-security, e-governance, and e-business. ...
The Internet revolution is also emerged as significant challenge due to the threats of hacking systems and individual accounts, mal-ware, fraud and vulnerabilities of system and networks, etc. ...
Acknowledgments The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER ...
fatcat:c2q6cwnb6vapbixa3b4ublzf3a
*Inform atica An International Journal of Computing and Informatics pecial Issue: Cryptology and Network Security Guest Editors
2002
unpublished
Acknowledgements The authors acknovvledge the support of the British Telecommunications plc. who funded this work and the help of the subjects who took part in the empirical study. ...
If a group member has generated two group signatures, the verifier cannot find any connection betvveen them. -Revocation. Group manager can find who is the signer of a group signature when needed. ...
The group public key can be used to encrypt a message and aH legitimate group members can decrypt it. The group public key is also used to verify a group signature from any member of the group. Y. ...
fatcat:vhqpwpgjyreipdpafwxoiu6qy4
Strengthening trust in the identity life cycle
[article]
2019
Furthermore, simpler travel document protocols with less complex infrastructure requirements, fewer steps, and long-term post-quantum security achieved via hash-based cryptography and code-based cryptography ...
The security of birth certificates is strengthened by a blockchain based system and a 2D barcode which stores biometric information. ...
Passive Authentication verifies the authenticity and integrity of the eMRTD data groups via a digital signature by verifying a digital signature created during document personalisation from the document ...
doi:10.17169/refubium-1829
fatcat:23mb2ng5j5hddgpbmldt5xylfm
Secure fingerprinting on sound foundations
[article]
2004
Based on the first thorough classification of assumptions related to discrete logarithms, this thesis gives novel insights into the relations between these assumptions. ...
scheme which fulfills advanced security requirements such as collusion-tolerance, asymmetry, anonymity and direct non-repudiation. ...
Another approach by Camenisch (2000) for constructing an anonymous fingerprinting scheme with direct non-repudiation is based on group signatures. ...
doi:10.22028/d291-25727
fatcat:axpwgdcw2jfu7kfk2wdaojeztq
« Previous
Showing results 1 — 15 out of 33 results