Filters








6,724 Hits in 4.0 sec

Practical forward secure sequential aggregate signatures

Di Ma
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
A forward secure sequential aggregate (F ssAgg) signature scheme allows a signer to iteratively combine signatures generated in different time intervals -and with different keysinto a single constant-size  ...  Both new schemes are derived from existing forward secure signature schemes.  ...  Guilin Wang for his time analyzing the security of proposed schemes. Furthermore, the author is grateful to the anonymous reviewers for their valuable comments.  ... 
doi:10.1145/1368310.1368361 dblp:conf/ccs/Ma08 fatcat:ioldi3ms2bdjrlty3yryjl4yzi

Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures [chapter]

Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
2017 Lecture Notes in Computer Science  
Our generic construction uses forward-secure signatures, in a plain and a sequential aggregate variant, where the latter is additionally fault-tolerant, as recently formalized by Hartung et al.  ...  Our implementation and the accompanying performance measurements confirm the practicality of our scheme. Problems with Existing Solutions.  ...  Their solution is based on forward-secure sequential aggregate signatures.  ... 
doi:10.1007/978-3-319-68637-0_6 fatcat:4efxjzc2yjc4bpcjdp4ibcwqku

Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks [chapter]

Huafei Zhu, Feng Bao, Tieyan Li
2005 Lecture Notes in Computer Science  
In this paper, a refined sequential aggregate signature scheme from RSA that works for any modulus is presented, then a compact stimulation mechanism without a central, trusted authority for routing discovery  ...  To define the security of sequential aggregate signature scheme, we allow the adversary to play the following game [11] .  ...  Lemma [17] : The sequential aggregate signature scheme described above is provable secure in the sense of [11] in the random oracle model.  ... 
doi:10.1007/11552055_20 fatcat:zwqtu6ehsrdxjkfitgvhwf2m54

Some aggregate forward-secure signature schemes

N.R. Sunitha, B.B. Amberker
2008 TENCON 2008 - 2008 IEEE Region 10 Conference  
Forward-secure digital signatures address this weakness, they ensure that the past signatures remain secure even if the current secret key is leaked.  ...  Following the notion of aggregate signatures introduced by Boneh et al, which provides compression of signatures, we have come up with aggregate signature schemes for ElGamal, DSA and Bellare-Miner forward-secure  ...  The same security guarantee is obtained in the Forward-secure DSA Signature Scheme. IV-A Aggregate Signatures for Forward-Secure DSA Let (M i 1 ,1 , i 1 , (r i 1 ,1 , s i 1 ,1 ) ) . . .  ... 
doi:10.1109/tencon.2008.4766832 fatcat:gp3q6mh5evcnzbzlmlzmpdwneu

Sequential Aggregate Signatures and Multisignatures Without Random Oracles [chapter]

Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2006 Lecture Notes in Computer Science  
The aggregate signatures obtained are shorter than Lysyanskaya et al. sequential aggregates and can be verified more efficiently than Boneh et al. aggregates.  ...  We present the first aggregate signature, the first multisignature, and the first verifiably encrypted signature provably secure without random oracles.  ...  To find a sequential aggregate signature scheme provably secure in the chosen-key model. 3. To find a sequential aggregate signature scheme with shorter user keys.  ... 
doi:10.1007/11761679_28 fatcat:exbdg56iyrcfnf3ig3wmsbqtyy

A New Approach to Secure Logging [chapter]

Di Ma, Gene Tsudik
2008 Lecture Notes in Computer Science  
We then propose a different approach to secure logging based upon recently developed Forward-Secure Sequential Aggregate (FssAgg) authentication techniques.  ...  We also investigate the concept of immutability in the context of forward-secure sequential aggregate authentication to provide finer grained verification.  ...  In a Fs-sAgg authentication scheme, forward-secure signatures (or MACs) generated by the same signer are sequentially combined into a single aggregate signature.  ... 
doi:10.1007/978-3-540-70567-3_4 fatcat:q7mibu3ha5ffbeicm6csl6724y

A new approach to secure logging

Di Ma, Gene Tsudik
2009 ACM Transactions on Storage  
We then propose a different approach to secure logging based upon recently developed Forward-Secure Sequential Aggregate (FssAgg) authentication techniques.  ...  We also investigate the concept of immutability in the context of forward-secure sequential aggregate authentication to provide finer grained verification.  ...  In a Fs-sAgg authentication scheme, forward-secure signatures (or MACs) generated by the same signer are sequentially combined into a single aggregate signature.  ... 
doi:10.1145/1502777.1502779 fatcat:gg5joyxpdfblnm2n4rmtrwd2g4

Research and Improvement of Ordered Multisignature Algorithm in Random Oracle Model

Yonglong Tang
2015 International Journal of Security and Its Applications  
Unlike multi-signature, aggregate signature aggregate signature scheme provides a method to aggregate signature by signature on different messages.  ...  The paper analyzes the reasons for the insecurity of the previous multi-signature scheme, and puts forward a genuine random sequential multi-signature scheme based on the waters signature scheme, and the  ...  It is also an interesting problem to find an ordered aggregate signature scheme provable secure without random oracles. and the experiment proves that this scheme is a good scheme suitable for the practical  ... 
doi:10.14257/ijsia.2015.9.2.16 fatcat:32noylms6bb4hmpzvh2ffulf7a

Sequential Aggregate Signatures from Trapdoor Permutations [chapter]

Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
2004 Lecture Notes in Computer Science  
We propose sequential aggregate signatures, in which the set of signers is ordered. The aggregate signature is computed by having each signer, in turn, add his signature to it.  ...  This makes sequential aggregate signatures a natural primitive for certificate chains, whose length can be reduced by aggregating all signatures in a chain.  ...  Sequential Aggregate Signatures We introduce sequential aggregate signatures and present a security model for them. Aggregate and Sequential Aggregate Signatures Boneh et al.  ... 
doi:10.1007/978-3-540-24676-3_5 fatcat:pf2debmhafbkvopg7msf2c5wri

A Secure Message Transaction Protocol for Delay Tolerant Networks

Zhongtian Jia, Lixiang Li, Zhuoran Yu, Shudong Li, Yixian Yang
2012 Journal of Communications  
The signatures are aggregated sequentially by the source node and the subsequent forwarders. The aggregated signatures record the message delivery paths.  ...  By checking the signatures aggregated so far, the intermediate nodes can be sure of the message authenticity and decide whether to deliver the messages to the next hops or not.  ...  The other aggregate mechanism is sequential aggregation. Different from the general aggregate signature, the sequential aggregate signature can only be performed during the signing process.  ... 
doi:10.4304/jcm.7.8.622-633 fatcat:xds3fj73wnghvkwtrhhisezyay

How to Aggregate the CL Signature Scheme [chapter]

Dominique Schröder
2011 Lecture Notes in Computer Science  
We present an aggregate signature scheme whose public key consists of only two group elements. It is therefore the first sequential aggregate signature scheme with short keys in the standard model.  ...  Our construction relies on the Camenisch-Lysyanskaya signature scheme (Crypto 2004) and is provably secure under the LRSW assumption.  ...  Here, we consider the sequential case where a signer receives an aggregate-so-far, adds its own signature to the aggregate and forwards the aggregate (containing the new signature) to the next signer.  ... 
doi:10.1007/978-3-642-23822-2_17 fatcat:ydmskjchgvg6hhooo3fwqesube

Privacy-Preserving Smart Metering with Authentication in a Smart Grid

Jun Hur, Dong Koo, Young Shin
2015 Applied Sciences  
Aggregated data is further integrated with an aggregate signature to achieve data integrity and smart meter authentication in such a way that dishonest or fake smart meters cannot falsify data en route  ...  The traditional security objectives of smart grids have been availability, integrity, and confidentiality.  ...  sequential aggregate signature algorithm [29] ).  ... 
doi:10.3390/app5041503 fatcat:ubzensiievcb7pi2kxe2jy6z3m

Validating Orchestration of Web Services with BPEL and Aggregate Signatures

Carlo Blundo, Emiliano De Cristofaro, Clemente Galdi, Giuseppe Persiano
2008 2008 Sixth European Conference on Web Services  
Whereas much attention has been dedicated to security issues for Web Services, no standard and practical solutions have been provided to secure workflows.  ...  In this paper, we address a recent cryptographic tool, aggregate signatures, to validate the orchestration by requiring all partners to sign the result of their computation.  ...  Similarly to AS, the resulting sequential aggregate signature has the same length of an ordinary signature. The scheme presented in [23] is proved secure in the random oracle model. WS-Security.  ... 
doi:10.1109/ecows.2008.9 dblp:conf/ecows/BlundoCGP08 fatcat:yffghgjzxngd3o7pmanlfxcynu

Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles

Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2012 Journal of Cryptology  
The aggregate signatures obtained are shorter than Lysyanskaya et al. sequential aggregates and can be verified more efficiently than Boneh et al. aggregates.  ...  We present the first aggregate signature, the first multisignature, and the first verifiably encrypted signature provably secure without random oracles.  ...  Sequential Aggregate Signatures. We compare our sequential aggregate signature scheme to the aggregate scheme of Boneh et al.  ... 
doi:10.1007/s00145-012-9126-5 fatcat:7iogswtsebcovm3xtn5v2yomve

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs

Jeonghyuk Lee, Jihye Kim, Hyunok Oh
2021 IEEE Access  
The proposed forward secure signature scheme can aggregate signatures generated by multiple users as well as a single user.  ...  INDEX TERMS Aggregate signature, digital signature, forward security, recursive proof composition, zero-knowledge proof, zk-SNARK.  ...  Bellare and Miner [5] formalize the security notion and present the first practical forward secure signature scheme.  ... 
doi:10.1109/access.2021.3093925 fatcat:6nmddj5jsnfdhppl43labljyqy
« Previous Showing results 1 — 15 out of 6,724 results