Filters








47,178 Hits in 10.6 sec

Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures [chapter]

Susan Hohenberger, Amit Sahai, Brent Waters
2013 Lecture Notes in Computer Science  
To the best of our knowledge, no prior candidate for realizing unrestricted identity-based aggregate signatures exists in either the standard or random oracle models.  ...  We build on this result to offer the first identity-based aggregate signature scheme that admits unrestricted aggregation.  ...  We note that while identity-based signatures follow trivially from standard signatures, identity-based aggregate signatures are nontrivial (more on this below).  ... 
doi:10.1007/978-3-642-40041-4_27 fatcat:bbi4vy5ysvhgvk4yfsk6it2dqy

On the generic construction of identity-based signatures with additional properties

Eike Kiltz, Javier Herranz, David Galindo
2010 Advances in Mathematics of Communications  
In particular, our work implies the existence of identity-based signatures with additional properties that are provably secure in the standard model, do not need bilinear pairings, or can be based on general  ...  encrypted signatures, ...) from PKI-based signature schemes with the same properties?  ...  The work of the second author has been carried out during the tenure of an ERCIM Fellowship (http://www.ercim.org/activity/ fellows/).  ... 
doi:10.3934/amc.2010.4.453 fatcat:zpdvgtqncvdcpiwjqzox3723ei

ID-based proxy re-signature without pairing

Zhiwei Wang, Aidong Xia, Mingjun He
2018 Telecommunications Systems  
ID-based: If the user's private key is generated from user's identity information, and the signature should be verified by the user's identity, then the proxy re-signature scheme is an ID-based scheme.  ...  On the other hand, it also can generate a re-signature key K ID2ID1 , which can be used to transform the signature conversely.  ...  ACKNOWLEDGMENT This research is partially supported by the National Natural Science Foundation of China under Grant No. 61373006, 61202353, 61272422 and the PAPD fund.  ... 
doi:10.1007/s11235-018-0458-9 fatcat:3xmzvqbglnblnopkeuqcdta3my

On the Generic Construction of Identity-Based Signatures with Additional Properties [chapter]

David Galindo, Javier Herranz, Eike Kiltz
2006 Lecture Notes in Computer Science  
In particular, our work implies the existence of identity-based signatures with additional properties that are provably secure in the standard model, do not need bilinear pairings, or can be based on general  ...  encrypted signatures, ...) from PKI-based signature schemes with the same properties?  ...  The work of the second author has been carried out during the tenure of an ERCIM Fellowship (http://www.ercim.org/activity/ fellows/).  ... 
doi:10.1007/11935230_12 fatcat:xmzndw3plzhqhbk4ryc5g6wb34

Extending the similarity-based XML multicast approach with digital signatures

Antonia Azzini, Stefania Marrara, Meiko Jensen, Jörg Schwenk
2009 Proceedings of the 2009 ACM workshop on Secure web services - SWS '09  
An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided.  ...  This paper investigates the interplay between similaritybased SOAP message aggregation and digital signature application.  ...  The goal is to reduce the total traffic generated over a network when sending SOAP responses from servers to clients.  ... 
doi:10.1145/1655121.1655131 dblp:conf/sws/AzziniMJS09 fatcat:zj2bwrdqzjfejo2ipnqqtimiwy

Why HTTPS Is Not Enough -- A Signature-Based Architecture for Trusted Content on the Social Web

Matthias Quasthoff, Harald Sack, Christoph Meinel
2007 IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)  
Easy to use, interactive web applications accumulating data from heterogeneous sources represent a recent trend on the World Wide Web, referred to as the Social Web.  ...  This prevents the new services from gaining ground in the enterprise, in medical or e-government environments.  ...  Hence, we suggest using a transform when creating the signature that removes the class attributes from the HTML code.  ... 
doi:10.1109/wi.2007.23 dblp:conf/webi/QuasthoffSM07 fatcat:hruzbsbjrra7ragmkx3bfpjgjq

Why HTTPS Is Not Enough -- A Signature-Based Architecture for Trusted Content on the Social Web

Matthias Quasthoff, Harald Sack, Christoph Meinel
2007 IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)  
Easy to use, interactive web applications accumulating data from heterogeneous sources represent a recent trend on the World Wide Web, referred to as the Social Web.  ...  This prevents the new services from gaining ground in the enterprise, in medical or e-government environments.  ...  Hence, we suggest using a transform when creating the signature that removes the class attributes from the HTML code.  ... 
doi:10.1109/wi.2007.4427196 fatcat:qli4zqqwx5d35pytwgbyqhphxy

An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT

Guruprakash J, Srinivas Koppu
2022 Informatica (Ljubljana, Tiskana izd.)  
A digital signature scheme (DSS) is used to generate signatures. This paper investigates the widely used elliptic curve digital signature algorithm (ECDSA) and its application to blockchain and IoT.  ...  Digital signatures are a vital part of the digital world. The trust factor in the digital world is ensured with a digital signature.  ...  Digital signature The digital signature (DS) is generated from a standard algorithm called the digital signature algorithm (DSA), which has to follow a specified standard scheme as put forth in the digital  ... 
doi:10.31449/inf.v46i2.3807 fatcat:dbn2dwzxkrbavg2c6d5oql7mqe

A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model

Viet Cuong Trinh
2019 Security and Communication Networks  
In this paper, we propose the first certificateless aggregate multisignature scheme that achieves the constant-size of signature and is secure in the standard model under a generalization of the Diffie-Hellman  ...  On the other hand, to deal with the problems of expensive certificates in certified public key cryptography and key escrow in identity-based cryptography, the notion of certificateless public key cryptography  ...  He is grateful for the VIASM for its support and hospitality. This work was conducted within the context of the Vietnamese Nafosted Project "Some Advanced Encryption Schemes for Lightweight Devices".  ... 
doi:10.1155/2019/3424890 fatcat:ko7duagb3nb5defb4wzs7dcheq

Extraction Security of Sequential Aggregate Signatures

ZHAI Jiaqi, LIU Jian, CHEN Lusheng
2021 Chinese journal of electronics  
In addition to the practical meaning, it also has benefits in the construction of hierarchical identity-based signatures as we will point out.  ...  Aggregate signature schemes enable anyone to compress many signatures into one. Besides the unforgeability of aggregate signature, another property called aggregate extraction sometimes is useful.  ...  [l1], the SAS scheme works incrementally from the signers' viewpoint as in Ref. [10] , but like a standard aggregate signature from the verifiers' viewpoint.  ... 
doi:10.1049/cje.2021.06.011 fatcat:duagiyhozvejtnzwkd4ub2dndu

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another

Shilpa Chaudhari, R. Aparna, Archana Rane
2021 Cybernetics and Information Technologies  
Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which does not learn any signing-key  ...  This article provides a survey summarizing and organizing PRS-related research by developing eight-dimensional taxonomy reflecting the directional feature, re-transformation capability, re-signature key  ...  Re-signature key is generated from the private key used in PKI and identity of the user.  ... 
doi:10.2478/cait-2021-0028 fatcat:47x4h2numbgx5duo6sdbcaqake

Content Protection in Named Data Networking: Challenges and Potential Solutions [article]

Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang
2018 arXiv   pre-print
We also present the speed-up techniques in generating signatures and verifying signatures such as pre-computation, batch verification and server-aided verification to reduce the computational cost of the  ...  We propose a variety of digital signature schemes to achieve the data integrity and origin authentication in NDN for various applications, which include cost-effective signatures, privacy-preserving signatures  ...  Public keys in identity-based trust management are derived directly from user identities such as email address, IP address etc while the private key is generated by a trusted third party.  ... 
arXiv:1810.11179v1 fatcat:bsajaxqc3jepzedb3o4kruqyam

A New Query Integrity Verification Method with Cluster-based Data Transformation in Cloud Computing Environment

Miyoung Jang, Min Yoon, Jae-Woo Chang
2015 International Journal of Smart Home  
To solve the original data leakage problem, our clustering-based data transformation scheme is designed to select anchors based on data distribution.  ...  A user compares the verification information with the cluster signatures stored in the verification index.  ...  If the generated signature is identical to the signature from the service provider, the client confirms that the query result is correct and genuine.  ... 
doi:10.14257/ijsh.2015.9.4.23 fatcat:dnbc2bdv6febvaa6v3tbl7ymq4

Identity-Based Multi-signatures from RSA [chapter]

Mihir Bellare, Gregory Neven
2006 Lecture Notes in Computer Science  
Since identity strings are likely to be much shorter than randomly generated public keys, the identity-based paradigm is particularly appealing for the case of multi-signatures.  ...  In this paper, we present and prove secure an identity-based multi-signature (IBMS) scheme based on RSA, which in particular does not rely on (the rather new and untested) assumptions related to bilinear  ...  In summary, unlike the case of standard signatures, there seems no trivial, general way to transform compact signature schemes into identity-based ones. An existing construction.  ... 
doi:10.1007/11967668_10 fatcat:fzd4uv73cfaztbxrclp2xvp72m

Identity-based key-insulated aggregate signature scheme

P. Vasudeva Reddy, P.V.S.S.N. Gopal
2017 Journal of King Saud University: Computer and Information Sciences  
To reduce the damage caused by the key exposure problem in aggregate signatures and preserve the benefits of identity-based (ID-based) cryptography, we hereby propose the first key-insulated aggregate  ...  signature scheme in ID-based setting.  ...  Also the authors would like to thank the editors of the journal for their support.  ... 
doi:10.1016/j.jksuci.2015.09.003 fatcat:hliexgb5cbhk7neym7hc3y3fpm
« Previous Showing results 1 — 15 out of 47,178 results