Filters








56,828 Hits in 2.9 sec

Efficient Sequential Aggregate Signed Data

Gregory Neven
2011 IEEE Transactions on Information Theory  
We generalize the concept of sequential aggregate signatures (SAS), proposed by Lysyanskaya, Micali, Reyzin, and Shacham (LMRS) at Eurocrypt 2004, to a new primitive called sequential aggregate signed  ...  data (SASD) that tries to minimize the total amount of transmitted data, rather than just signature length.  ...  Comparison of existing aggregate signature (AS), sequential aggregate signature (SAS), sequential aggregate signed data (SASD), multi-signature (MS), and multi-signed data (MSD) schemes.  ... 
doi:10.1109/tit.2010.2091434 fatcat:buikzrstobca5hp6wrtjlxpxyu

Efficient Sequential Aggregate Signed Data [chapter]

Gregory Neven
Advances in Cryptology – EUROCRYPT 2008  
We generalize the concept of sequential aggregate signatures (SAS), proposed by Lysyanskaya, Micali, Reyzin, and Shacham (LMRS) at Eurocrypt 2004, to a new primitive called sequential aggregate signed  ...  data (SASD) that tries to minimize the total amount of transmitted data, rather than just signature length.  ...  Comparison of existing aggregate signature (AS), sequential aggregate signature (SAS), sequential aggregate signed data (SASD), multi-signature (MS), and multi-signed data (MSD) schemes.  ... 
doi:10.1007/978-3-540-78967-3_4 dblp:conf/eurocrypt/Neven08 fatcat:cwvteqwf5fdvli3qqpszri3gfq

How to Aggregate the CL Signature Scheme [chapter]

Dominique Schröder
2011 Lecture Notes in Computer Science  
Efficiency refers to three kinds of costs: computational, storing data, and the cost of communication.  ...  We present an aggregate signature scheme whose public key consists of only two group elements. It is therefore the first sequential aggregate signature scheme with short keys in the standard model.  ...  Neven suggested at Eurocrypt 2008 the notion of sequential aggregate signed data, which generalized sequential aggregate signature in the sense that these scheme compress the whole data [31] .  ... 
doi:10.1007/978-3-642-23822-2_17 fatcat:ydmskjchgvg6hhooo3fwqesube

History-Free Sequential Aggregate Signatures [chapter]

Marc Fischlin, Anja Lehmann, Dominique Schröder
2012 Lecture Notes in Computer Science  
In this work we adopt the notion of history-freeness to the case of sequential aggregate signatures, only allowing the aggregate-so-far, the local message, and signing key to enter the computation, but  ...  However, sequential aggregation is required for many applications such as for authenticating routing information or for certificate chains, and in these applications the verifiability of the order of signing  ...  Aggregate Signing.  ... 
doi:10.1007/978-3-642-32928-9_7 fatcat:n44vw2wmpvge3g4lu2olz34g4m

Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency [chapter]

Kwangsu Lee, Dong Hoon Lee, Moti Yung
2013 Lecture Notes in Computer Science  
reasonable parameters: short public key size, short aggregate signatures size, and efficient aggregate signing/verification.  ...  The first scheme is an "efficient sequential aggregate signature" scheme with the shortest size public key, to date, and very efficient aggregate verification requiring only a constant number of pairing  ...  A sequential aggregate sig-nature assumes that the aggregation mode is done in linear order: signed message after signed message.  ... 
doi:10.1007/978-3-642-39884-1_14 fatcat:ueuw3js2dfef5di2juvh35b2sa

History-Free Aggregate Message Authentication Codes [chapter]

Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder, Peter Schröder, Daniel Wagner
2010 Lecture Notes in Computer Science  
Definition Definition 1 (Aggregate MACs). An aggregate message authentication code Agg = (KGen, Mac, Vf, Agg, AVf) is a tuple of efficient algorithms such that: Key Generation.  ...  Non-Sequential Aggregation of MACs Roughly speaking, an aggregate MAC is a single tag, called the aggregate, of q different users on q different messages such that the aggregate has nearly the same size  ...  For such sequential aggregate signed data only the aggregate (being of roughly the same size as the messages) is passed to the next round.  ... 
doi:10.1007/978-3-642-15317-4_20 fatcat:ub2kvr4qd5gnpem32pwquk535e

Practical forward secure sequential aggregate signatures

Di Ma
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
Such a signature offers forward security, storage/communication efficiency, as well as overall integrity of the signed messages.  ...  A forward secure sequential aggregate (F ssAgg) signature scheme allows a signer to iteratively combine signatures generated in different time intervals -and with different keysinto a single constant-size  ...  [19] proposed another sequential aggregate signature scheme with more efficient verification.  ... 
doi:10.1145/1368310.1368361 dblp:conf/ccs/Ma08 fatcat:ioldi3ms2bdjrlty3yryjl4yzi

Aggregated path authentication for efficient BGP security

Meiyuan Zhao, Sean W. Smith, David M. Nicol
2005 Proceedings of the 12th ACM conference on Computer and communications security - CCS '05  
The main idea is to combine the time-efficient scheme of signature amortization with the space-efficient techniques of aggregate signatures [4] .  ...  In this paper, we combine two efficient cryptographic techniques-signature amortization and aggregate signatures-to design new aggregated path authentication schemes.  ...  Sequential Aggregate Signatures A sequential aggregate signature scheme [34] is based on homomorphic trapdoor permutations, such as RSA.  ... 
doi:10.1145/1102120.1102139 dblp:conf/ccs/ZhaoSN05 fatcat:utxlkybj45gqjjgmlu57hdv5jq

Privacy-Preserving Smart Metering with Authentication in a Smart Grid

Jun Hur, Dong Koo, Young Shin
2015 Applied Sciences  
Aggregated data is further integrated with an aggregate signature to achieve data integrity and smart meter authentication in such a way that dishonest or fake smart meters cannot falsify data en route  ...  In this study, we propose a distributed incremental data aggregation scheme where all smart meters on an aggregation path are involved in routing the data from the source meter to the collection unit.  ...  Identity-Based Sequential Aggregate Signature The aggregate signature scheme consists of the following four algorithms: Setup, KeyDer, Sign, and V f .  ... 
doi:10.3390/app5041503 fatcat:ubzensiievcb7pi2kxe2jy6z3m

Towards Lattice Based Aggregate Signatures [chapter]

Rachid El Bansarkhani, Johannes Buchmann
2014 Lecture Notes in Computer Science  
We propose the first lattice-based sequential aggregate signature (SAS) scheme that is provably secure in the random oracle model.  ...  Generally speaking, SAS schemes enable any group of signers ordered in a chain to sequentially combine their signatures such that the size of the aggregate signature is much smaller than the total size  ...  In [LMRS04] Lysyanskaya et al. proposed a new variant of AS, known as sequential aggregate signatures (SAS), which differs from the conventional AS schemes by imposing [DDLL13], [GLP12], [Lyu12].  ... 
doi:10.1007/978-3-319-06734-6_21 fatcat:z7n6r5vmlzgndnyqdofl6a7khq

Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network

Yongjun Ren, Yan Leng, Fujian Zhu, Jin Wang, Hye-Jin Kim
2019 Sensors  
To solve the problems above, this paper proposed a sequential aggregate signature scheme with a designated verifier (DVSSA) to ensure that the user's data can only be viewed by the designated person and  ...  They provide a convenient way to collect patient data, but they also bring serious problems which are mainly reflected in the safe storage of the collected data.  ...  Sequential Aggregate Signature Model In the sequential aggregate signature, each signer must aggregate his signature into the current signature in a certain order.  ... 
doi:10.3390/s19102395 fatcat:sjhfg7s5efe35efkhiihh4ug2e

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases [chapter]

Attila A. Yavuz
2013 Lecture Notes in Computer Science  
Our specific scheme is constructed from Condensed-RSA and Sequential Aggregate RSA. It has a very low verifier computational overhead and end-to-end delay with a small signature size.  ...  Both PISB schemes are very simple, noninteractive, and computation/communication efficient. Our generic scheme can be constructed from any aggregate signature coupled with a standard signature.  ...  Hence, each data owner digitally signs her data before outsourcing it as described previously.  ... 
doi:10.1007/978-3-642-39256-6_12 fatcat:smammss2gbcitp22ca7grr2hzu

Sequential Aggregate Signatures from Trapdoor Permutations [chapter]

Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
2004 Lecture Notes in Computer Science  
This makes sequential aggregate signatures a natural primitive for certificate chains, whose length can be reduced by aggregating all signatures in a chain.  ...  We propose sequential aggregate signatures, in which the set of signers is ordered. The aggregate signature is computed by having each signer, in turn, add his signature to it.  ...  Aggregate Signing. The input is a private key (s, t), a message M ∈ {0, 1} * to be signed, and a sequential aggregate σ on messages M under public keys s.  ... 
doi:10.1007/978-3-540-24676-3_5 fatcat:pf2debmhafbkvopg7msf2c5wri

An Efficient Synchronized Aggregate Signature Scheme From Standard RSA Assumption

Xinshun Guo, Zhiwei Wang
2014 International Journal of Future Generation Communication and Networking  
We proposed an efficient synchronized aggregate signature scheme from the standard RSA assumption. Our construction is based on the Hohenburger and Waters RSA signature (Crypto 09).  ...  An aggregate is a digital signature that supports aggregation where any one given n signatures on n distinct messages from n different users can aggregate all these signatures into a single one.  ...  A sequential aggregate signature is that signatures can only be aggregated by sequentially passing the aggregate from one signer to the next.  ... 
doi:10.14257/ijfgcn.2014.7.3.21 fatcat:dvz2xlxy6veodfqovwynelfpuq

Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles

Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2012 Journal of Cryptology  
The aggregate signatures obtained are shorter than Lysyanskaya et al. sequential aggregates and can be verified more efficiently than Boneh et al. aggregates.  ...  Signatures in our aggregate signature scheme are sequentially constructed, but knowledge of the order in which messages were signed is not necessary for verification.  ...  [28] (LMRS), and to Neven's sequential aggregate signed data scheme, an improved version of LMRS [34] .  ... 
doi:10.1007/s00145-012-9126-5 fatcat:7iogswtsebcovm3xtn5v2yomve
« Previous Showing results 1 — 15 out of 56,828 results