Filters








30,243 Hits in 6.3 sec

Delegating a Pairing Can Be Both Secure and Efficient [chapter]

Sébastien Canard, Julien Devigne, Olivier Sanders
<span title="">2014</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
One possibility to avoid this problem of efficiency is to delegate the pairing computation to a third party. The result should clearly be both secure and efficient.  ...  We also provide efficient ways to delegate the computation of a pairing e(A, B), depending on the status of A and B.  ...  In the setting of the delegation of a pairing, two security properties could be taken into account.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-07536-5_32">doi:10.1007/978-3-319-07536-5_32</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/khxzsupe4zeqzltvi333ogg36i">fatcat:khxzsupe4zeqzltvi333ogg36i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200325161432/https://link.springer.com/content/pdf/10.1007%2F978-3-319-07536-5_32.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/a2/7da2c8d60b7ce8b61cec0d58ab10bf45d27c0d93.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-07536-5_32"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure and Efficient Delegation of Elliptic-Curve Pairing [chapter]

Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain
<span title="">2020</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper we show that the computation of bilinear pairings in all known pairing-based cryptographic protocols can be efficiently, privately and securely delegated to a single, possibly malicious,  ...  Important requirements for such delegation protocols include privacy of the client's pairing inputs and security of the client's output, in the sense of detecting, except for very small probability, any  ...  In this paper we show that bilinear pairings can be efficiently, privately and securely delegated to a single, possibly malicious, server.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-57808-4_3">doi:10.1007/978-3-030-57808-4_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jiqv5heanrfo7fdz4tx3vxjhbe">fatcat:jiqv5heanrfo7fdz4tx3vxjhbe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201103043241/http://eprints.whiterose.ac.uk/159859/1/acns2020dkks_cameraready.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e1/7a/e17af0cbfe96a50a40ae25659d546b39f6900ec1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-57808-4_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Delegation of Elliptic-Curve Pairing [chapter]

Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing.  ...  A computationally limited device (typically a smart-card) will delegate the computation of the pairing e(A, B) to a more powerful device (for example a PC), in such a way that 1) the powerful device learns  ...  A second interesting question consists in bounding the number of protocol rounds (passes) necessary to delegate pairing in diverse contexts.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-12510-2_3">doi:10.1007/978-3-642-12510-2_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e6hygm7zojfl3gwnw5qqkfhckm">fatcat:e6hygm7zojfl3gwnw5qqkfhckm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504123524/https://link.springer.com/content/pdf/10.1007%2F978-3-642-12510-2_3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/e6/a9e64052f018ecce44b69b1a21fc39230c3a4432.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-12510-2_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing

<span title="2020-01-31">2020</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
In order to make the delegation process more secure and authentic, we proposed a secure and efficient identity-based proxy signcryption in cloud data sharing (SE-IDPSC-CS), which provides a secure privilege  ...  of the company went for a business trip, he/she need to delegate his/her signing authorities to someone such that, the delegatee can act as a manager and sign a message on his/her behalf.  ...  Universities Key Laboratory of Cloud Computing and Complex Systems, and in part by the Natural Science Foundation of China under Grants U1401257, 61472064 and 61602096.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2020.01.025">doi:10.3837/tiis.2020.01.025</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7xxdtf4ydvezrjjy6qlme7c3ba">fatcat:7xxdtf4ydvezrjjy6qlme7c3ba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200505045203/http://www.itiis.org/digital-library/manuscript/file/23242/TIIS%20Vol%2014,%20No%201-25.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/03/02/030245fce131371506a56cfa36a685057afd714e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2020.01.025"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure Mobile Agent Using Strong Non-designated Proxy Signature [chapter]

Byoungcheon Lee, Heesun Kim, Kwangjo Kim
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We provide RSA-based and Schnorr-based constructions of secure mobile agent, and moreover we show that the Schnorr-based scheme can be used very efficiently in multi-proxy mobile agent situation.  ...  In this paper we show that secure mobile agent can be constructed using strong non-designated proxy signature [LKK01] which represents both the original signer's (customer) and the proxy signer's (remote  ...  Because SNPS represents both the original signer's and the proxy signer's signatures, it can be considered as an efficient integration scheme of two related signatures.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-47719-5_37">doi:10.1007/3-540-47719-5_37</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rpf4apcidbep5hmmhx6qgy6mp4">fatcat:rpf4apcidbep5hmmhx6qgy6mp4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810080538/http://cris.joongbu.ac.kr/publication/SMA-ACISP2001.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/51/3b/513b1d460b806fc21aba3798dab50ae8276a707d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-47719-5_37"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Improved Delegation of Computation Using Fully Homomorphic Encryption [chapter]

Kai-Min Chung, Yael Kalai, Salil Vadhan
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
However, the "offline stage" (which depends on the function F but not the inputs to be delegated) is inefficient: the delegator runs in time poly(T ) and generates a public key of length poly(T ) that  ...  The "online stage" of the Gennaro et al. scheme is very efficient: the parties exchange two messages, the delegator runs in time poly(log T ), and the worker runs in time poly(T ), where T is the time  ...  Acknowledgments We are grateful to Boaz Barak for collaboration at the start of this research, and for sharing his insights with us.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-14623-7_26">doi:10.1007/978-3-642-14623-7_26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rjxkh6gfwjeu7i3yru7ab6vqrq">fatcat:rjxkh6gfwjeu7i3yru7ab6vqrq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030065839/https://link.springer.com/content/pdf/10.1007%2F978-3-642-14623-7_26.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/f9/5df995b8f354890ba8dbda2b93751e37bc513e16.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-14623-7_26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An Efficient ID-Based Proxy Signcryption Scheme

G. Swapna, P.V.S.S.N Gopal, T. Gowri, P. Vasudeva Reddy
<span title="2012-07-22">2012</span> <i title="Institute of Advanced Engineering and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4opirqn5wva43mypnaeerrydyy" style="color: black;">International Journal of Information and Network Security (IJINS)</a> </i> &nbsp;
By combining the functionalities of proxy signature scheme and signcryption scheme, in this paper, we proposed a new ID-based proxy signcryption scheme which offers both public verifiability and forward  ...  The security requirements and performance of the proposed scheme are analyzed.  ...  Let A be the original signcrypter / sender with the identity and the private key He delegate his signing rights to a proxy signcrypter /sender B with identity and the private key A warrant is used to delegate  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijins.v1i3.759">doi:10.11591/ijins.v1i3.759</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/evh4eopfprhwnkrzanmnsyokua">fatcat:evh4eopfprhwnkrzanmnsyokua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427035618/http://www.iaescore.com/journals/index.php/IJINS/article/download/16151/9784" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b2/6d/b26d54d089445089c353931dfdc1ae9568a424ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijins.v1i3.759"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings

Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu
<span title="2013-12-12">2013</span> <i title="Publishing House Technologija"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7og4indwyvastaeh3sjmrjhj34" style="color: black;">Information Technology and Control</a> </i> &nbsp;
This study proposes a novel efficient proxy signature scheme for mobile devices using bilinear pairings.  ...  A proxy signature scheme is useful and convenient because it allows a proxy signer to sign a message on behalf of an entity.  ...  Acknowledgements The authors gratefully acknowledge the support from Taiwan Information Security Center (TWISC) and National Science Council, Taiwan, under the Grants Numbers NSC 102-2218-E-011-012 and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5755/j01.itc.42.4.1969">doi:10.5755/j01.itc.42.4.1969</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/of6l7t6ambca7bncoievqjseku">fatcat:of6l7t6ambca7bncoievqjseku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200210221802/http://itc.ktu.lt/index.php/ITC/article/download/1969/3099" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/58/1c580e7e04528ec42b468f54a86417a8aac151a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5755/j01.itc.42.4.1969"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT [chapter]

Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Hence, we provide a lightweight delegation enabling weak clients to securely and verifiably delegate MEs without any expensive local computation (neither online nor offline).  ...  In this paper, we address the problem of verifiably secure delegation of MEs using two servers, where at most one of which is assumed to be malicious (the OMTUP-model).  ...  Although the simulation-based security definitions [12] intuitively include (whatever can be efficiently computed about secret values with the protocol's view can also be efficiently computed without  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-99136-8_14">doi:10.1007/978-3-319-99136-8_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5yrhz4rxqvdejakqoskvvrjome">fatcat:5yrhz4rxqvdejakqoskvvrjome</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190302111718/http://pdfs.semanticscholar.org/b4bd/a4c7947427d03ebe961d298cd70ee2ff9dbc.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/bd/b4bda4c7947427d03ebe961d298cd70ee2ff9dbc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-99136-8_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Efficient one-time proxy signatures

M. Mehta, L. Harn
<span title="">2005</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t47ofdwr3fc7rk7fjpb6gtmdsu" style="color: black;">IEE Proceedings - Communications</a> </i> &nbsp;
It is shown that the scheme can provide signature indistinguishability, restrict the proxy signing power, provide signature unlinkability, resolve internal disputes, and is more efficient.  ...  Proxy signatures allow a signer to delegate signing ability to a proxy signer. Many schemes have been proposed for proxy signatures under typical security requirements.  ...  For a given a pair ðHK; TKÞ I, a pair ðm 1 ; s 1 Þ, and additional message m 2 , trapdoor collision can be found in the following way.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/ip-com:20045251">doi:10.1049/ip-com:20045251</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k6i2sxzkozghjf73bjkwnuyabi">fatcat:k6i2sxzkozghjf73bjkwnuyabi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100707145806/http://h.web.umkc.edu/harnl/papers/J59.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dc/2c/dc2c4374bcde3b7109c671941643133444c807be.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/ip-com:20045251"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing

Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian
<span title="">2017</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
Hence, we propose a scalable verifiable outsourcing computation protocol (SV-OC) in marine cloud computing at first and extract a single-mode version of it (SM-SV-OC), where both protocols allow anyone  ...  Outsourcing computation with verifiability is a merging notion in cloud computing, which enables lightweight clients to outsource costly computation tasks to the cloud and efficiently check the correctness  ...  This work was supported by the National Natural Science Foundation of China (61571191, 61572192, 61472249, 61472142, and 61402282), the "Dawn" Program of Shanghai Education Commission (no. 16SG21), and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2017/6128437">doi:10.1155/2017/6128437</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/izqz2q7lobbvrbuyewzzogmy4q">fatcat:izqz2q7lobbvrbuyewzzogmy4q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200214045047/http://downloads.hindawi.com/journals/wcmc/2017/6128437.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c9/53/c9535d9cea26dfeb4d162b85b5a4c017370a5cd8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2017/6128437"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Server-aided signatures verification secure against collusion attack

Sherman S. M. Chow, Man Ho Au, Willy Susilo
<span title="">2011</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS &#39;11</a> </i> &nbsp;
In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to a powerful but possibly untrusted server.  ...  Compared with the protocol of Girault and Lefranc in Asiacrypt '05, ours provides a higher level of security yet applicable to a much wider class of pairing-based cryptosystems.  ...  We reduce the task of server-aided verification to the task of "secure" delegation of pairing computation. Let S be a secure pairing delegation protocol to be described in details.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1966913.1966967">doi:10.1145/1966913.1966967</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/ChowAS11.html">dblp:conf/ccs/ChowAS11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2r3zzv4axzelpmoaj5ntzjjdle">fatcat:2r3zzv4axzelpmoaj5ntzjjdle</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190217121703/https://static.aminer.org/pdf/20170130/pdfs/ccs/tknediv8lqpm9yjykxmr0bs1jgwuoop4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/8c/bf8c606dff1b640900f59f49bb26072b9eeaa9c3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1966913.1966967"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

An Identity Based Proxy Re-Signature Scheme

Tulasi Menon
<span title="">2012</span> <i title="IACSIT Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3zatj3ngx5g7ho7ki6fvv35s7m" style="color: black;">International Journal of Engineering and Technology</a> </i> &nbsp;
In this paper, we describe the flaw in this scheme, with respect to the definitions of delegator and delegate security defined by Ateniese et al.  ...  A modified version of this signature, which can be used to transform signatures between signers in different ID-Based domains, is detailed.  ...  Unforgeability As per the security notions, the proxy signature should not be susceptible to forgery in three scenarios: Limited Proxy: When both the delegator and delegate are honest, the proxy only knows  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijet.2012.v4.370">doi:10.7763/ijet.2012.v4.370</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/c37jwyghmbbari6bkhrncfyfwa">fatcat:c37jwyghmbbari6bkhrncfyfwa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721021441/http://www.ijetch.org/papers/370-R058.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/78/8c785b2ce38aa27fbbeed2bca0b7aded53efbe46.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijet.2012.v4.370"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

An Efficient Identity based Multi-Proxy Multi-Signcryption Scheme from Bilinear Pairings

Tej Singh, Rashid Ali, Musharraf Ali
<span title="2016-10-17">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
In this paper, we propose an efficient and secure identity based multi-proxy multi signcryption scheme from bilinear pairings.  ...  Signcryption is a cryptography primitive that fulfills both the functions of digital signature and encryption and guarantees non-repudiation, confidentiality and integrity in a more efficient way.  ...  Let G1 be a cyclic additive group generated by P, whose order is a prime q, and G2 be a cyclic multiplicative group of the same order q. Let a, b be elements of * q Z .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911627">doi:10.5120/ijca2016911627</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/en3vme67xvc3rddaqw4n3r6eli">fatcat:en3vme67xvc3rddaqw4n3r6eli</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603163422/https://www.ijcaonline.org/archives/volume151/number6/singh-2016-ijca-911627.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/93/8d/938d0e3ca0043b7421eeebb5b6dc9ac39ad1a49a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911627"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Provably secure attribute based signcryption with delegated computation and efficient key updating

<span title="2017-05-31">2017</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.  ...  Citation HONG, Hanshu; XIA, Yunhao; SUN, Zhixin; and LIU, Ximeng. Provably secure attribute based signcryption with delegated computation and efficient key updating. (2017).  ...  can delegate most of the de-signcryption task to data server, which can decrease the calculation burden on client side. 4) Via proof and efficiency analysis, our scheme is show to be confidential and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2017.05.019">doi:10.3837/tiis.2017.05.019</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ypzzl56lwfdfxd2omwkbrlh6ha">fatcat:ypzzl56lwfdfxd2omwkbrlh6ha</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200322121344/https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=4812&amp;context=sis_research" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/cb/6dcb0e655e37e6a20ed3c53c960d8d9114173bbe.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2017.05.019"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 30,243 results