Filters








31,353 Hits in 3.9 sec

Security of BLS and BGLS signatures in a multi-user setting

Marie-Sarah Lacharité
2017 Cryptography and Communications  
A scheme that is secure in the single-user setting may not be as secure in the multi-user setting.  ...  We introduce a multi-user security model for general aggregate signature schemes, in contrast to the original "chosen-key" security model of BGLS that is analogous to the single-user setting of a signature  ...  The security of any general aggregate signature scheme in this new multi-user setting reduces to its security in the original chosen-key setting with a tightness loss of the number of users.  ... 
doi:10.1007/s12095-017-0253-6 fatcat:dbrpfrcpevc6pa4ako66ody3hu

How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme

Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, Guowen Li
2008 Journal of Communications  
In the threshold-server assisted signature scheme, the generation of a valid signature needs the cooperation of the user and a quorum of servers.  ...  In this paper, we discuss a problem of how to construct forward secure single-server, multi-server and thresholdserver assisted signature schemes using Bellare-Miner Scheme and propose three signature  ...  In the last scheme, any generation of a valid signature needs the cooperation of the user and a quorum of servers.  ... 
doi:10.4304/jcm.3.7.28-35 fatcat:t2ygf6cevjg7bb6kj6pwbw6cti

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

2017 KSII Transactions on Internet and Information Systems  
A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature  ...  In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model.  ...  Chang [18] proposed an ID-based multi-signer universal designated multi-verifier signature, which allows a set of multi-signer to cooperatively generate a signature and designate a set of multi-verifier  ... 
doi:10.3837/tiis.2017.11.025 fatcat:xgjomyekhvbexo24lx5af62szq

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting [chapter]

Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang
2010 Lecture Notes in Computer Science  
In [11] , the security of a verifiably committed signature scheme (equivalently, an optimistic fair exchange protocol) in the single-user setting consists of three aspects: security against the signer,  ...  This paper investigates the conditions under which the security of optimistic fair exchange in the single-user setting is preserved in the multi-user setting.  ...  They defined the security notions of verifiably committed signature in the multi-user setting and proposed a concrete construction of multi-user secure stand-alone and setup-free verifiably committed signature  ... 
doi:10.1007/978-3-642-13013-7_8 fatcat:rcvt3xpe5zgmhghb6h4qfne7bq

An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme [article]

Munendra Agrawal, Prashant Kushwah, Sunder Lal
2009 arXiv   pre-print
This paper proposes a multi signcryption scheme in which no pairing is computed on the signcryption stage and the signatures can be verified publicly.  ...  Multi-signcryption is used when different senders wants to authenticate a single message without revealing it.  ...  In 1989, Boyed [6] defined multi signature scheme the scenario where more than one user authenticate a single message in such a way that a verifier verify only a single compact signature on that message  ... 
arXiv:0909.1412v1 fatcat:hcyttrzkxfcrxlnjco73mdn6xu

Signcryption Scheme Based on SCHNORR Digital Signature

Laura Savu
2012 International Journal of Peer to Peer Networks  
The two-users security model is presented in the sixth part and multi-user security model is presented in the seventh part.  ...  The stepby-step implementation of the Schnorr Signcryption scheme in a source code program is reflected in the fourth part.  ...  This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually  ... 
doi:10.5121/ijp2p.2012.3101 fatcat:mfloitn4krbxbekofasg3b5qx4

Optimistic Fair Exchange with Strong Resolution-Ambiguity

Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiang
2011 IEEE Journal on Selected Areas in Communications  
We prove that in the certified-key model, an OFE protocol is secure in the multi-user setting if it is secure in the single-user setting and has the property of strong resolution-ambiguity.  ...  Our result not only simplifies the security analysis of OFE protocols in the multiuser setting but also provides a new approach for the design of multi-user secure OFE protocols.  ...  DEFINITIONS OF OFE IN THE MULTI-USER SETTING In this section, we describe the syntax and security definitions of OFE in the multi-user setting [4] . A.  ... 
doi:10.1109/jsac.2011.110814 fatcat:eye4nbgbgrggjgpacvwhdjhgrm

A new efficient optimistic fair exchange protocol without random oracles

Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2011 International Journal of Information Security  
In this work, we propose a new construction of OFE from another cryptographic primitive, called time capsule signature.  ...  Applying our generic construction to the time capsule signature scheme recently proposed by Libert and Quisquater, we obtain a new concrete and efficient OFE construction secure based on Computational  ...  As we consider multi-user setting in this work, we select those schemes proved to be secure in the multi-user setting for comparison in Table 2 .  ... 
doi:10.1007/s10207-011-0152-3 fatcat:mso42x255fedhffwoo2zxd7mom

Revisiting Optimistic Fair Exchange Based on Ring Signatures

Yang Wang, Man Ho Allen Au, Willy Susilo
2014 IEEE Transactions on Information Forensics and Security  
of unforgeable under an adaptive attack, against a static adversary in the 2-user setting.  ...  of unforgeable under an adaptive attack, against a static adversary in the 2-user setting.  ...  A. Comparison There are only three efficient OFE schemes that are known to be secure in the multi-user setting and chosen-key model without random oracles.  ... 
doi:10.1109/tifs.2014.2354986 fatcat:blas76uwb5hs3ar5kzlmdwz3hi

Signcryption scheme based on schnorr digital signature [article]

Laura Savu
2012 arXiv   pre-print
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.  ...  This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area.  ...  This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually  ... 
arXiv:1202.1663v1 fatcat:cfngrkm4dzdlvhsefek4k6kmam

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs

Jeonghyuk Lee, Jihye Kim, Hyunok Oh
2021 IEEE Access  
The proposed forward secure signature scheme can aggregate signatures generated by multiple users as well as a single user.  ...  In this paper, we propose a new forward secure aggregate signature scheme utilizing recursive zk-SNARKs (zero knowledge Succinct Non-interactive ARguments of Knowledge).  ...  FORWARD SECURE MULTI-USER AGGREGATE SIGNATURES We extend the forward secure signature notion to a forward secure multi-user aggregate signature that supports the aggregation of multi-user signatures whose  ... 
doi:10.1109/access.2021.3093925 fatcat:6nmddj5jsnfdhppl43labljyqy

Ambiguous optimistic fair exchange: Definition and constructions

Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2015 Theoretical Computer Science  
We present a formal security model for AOFE in the multi-user setting and chosen-key model, and propose a generic construction of AOFE that is provably secure under our model.  ...  We present a formal security model for AOFE in the multi-user setting and chosen-key model, and propose a generic construction of AOFE that is provably secure under our model.  ...  $ A preliminary version of this paper appeared in Asiacrypt 2008 [25] . This is a vastly extended version. This work is supported by the National Natural  ... 
doi:10.1016/j.tcs.2014.09.043 fatcat:gbbutkwh3vg6dhcziyzwk6evjm

Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud

Priti Rumao, Sumedh Pundkar
2016 International Journal of Computer Applications  
So the motivation of this paper is to propose a secure data reading and sharing scheme using above mentioned scheme.  ...  To overcome these issues, concept of ring signature has been introduced for data sharing amongst large number of users. Ring signatures are used to provide user's anonymity and signer's privacy.  ...  The ring signature allows a user from a set of possible signers, to convince the verifier that the author of the signature belongs to the set of group of authenticated signers but identity of the author  ... 
doi:10.5120/ijca2016909894 fatcat:fja3osi23nexznr3ooe3shabmm

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
schemes, w.r.t. supported features, namely security, privacy and functional requirements.  ...  The loss of user control over their cloud stored data introduced several security and privacy concerns. To address these concerns, cryptographic techniques are widely adopted at the user side.  ...  Therefore, the signature is generated according to a set of attributes by a user whose access structure satisfies this set. Accountability in ABS ABS schemes need to anonymise users identities.  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

New Blind Muti-signature Schemes based on ECDLP

Duc Nguyen Tan, Hai Nguyen Nam, Minh Nguyen Hieu, Hiep Nguyen Van
2018 International Journal of Electrical and Computer Engineering (IJECE)  
In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required.  ...  The proposed schemes are based on the GOST R34.10-2012 digital signature standard and the EC-Schnorr digital signature scheme, and they satisfy blind multi-signature security requirements and have better  ...  considered one of the two signature sets for A (A acts as the signatory), and ( , , ) e r s is the data stored in the release scheme of A.  ... 
doi:10.11591/ijece.v8i2.pp1074-1083 fatcat:f5o46ccvk5eblokgvabhd2a36m
« Previous Showing results 1 — 15 out of 31,353 results