45 Hits in 10.1 sec

Group Signature with Verifier-Local Revocation Based on Coding Theory

Luping Wang, Kai Zhang, Haifeng Qian, Jie Chen, Jin Wook Byun
2021 Security and Communication Networks  
Group signature with verifier-local revocation (VLR-GS) is a special variant of revocable group signature that not only allows a user to anonymously sign messages but also only requires the verifiers to  ...  To date, a number of VLR-GS schemes have been proposed under bilinear groups and lattices, while they have not yet been instantiated based on coding theory.  ...  Our main contribution is to give a generic construction for the code-based group signature scheme with support of verifier-local revocation function.  ... 
doi:10.1155/2021/3259767 fatcat:kvgyoxi3h5gl3kqz2uaonrowwe

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
2022 Cryptography  
Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings.  ...  This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.  ...  In group signature schemes with verifier-local revocation [29, 39, 41, 89] , a token determines the users' revocation status.  ... 
doi:10.3390/cryptography6010003 fatcat:dby2hr4g4zhqtemdm3tm43552u

Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation [article]

Xiuju Huang, Jiashuo Song, Zichen Li
2022 IACR Cryptology ePrint Archive  
In this paper, a zero-knowledge proof scheme on the lattice has been proposed. Based on it, a group signature scheme with VLR has been constructed.  ...  Therefore, an efficient lattice signature scheme with a local revocation mechanism and alter the number of users has become an important topic.  ...  Fully Anonymity Our VLR group signature scheme is fully-anonymous in the random oracle model.  ... 
dblp:journals/iacr/HuangSL22 fatcat:anmsovq65fgirmqdwbzsdbmf6u

Foundations of Fully Dynamic Group Signatures

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
2020 Journal of Cryptology  
Group signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager.  ...  For group signatures to be applicable in practice, they need to support fully dynamic groups, i.e., users may join and leave at any time.  ...  verifier-local revocation and linkable group signatures out of scope.  ... 
doi:10.1007/s00145-020-09357-w fatcat:cbboijkhafbifhlsbks2lkf4qu

Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting

Peng Li, Junzuo Lai, Yongdong Wu, Savio Sciancalepore
2021 Security and Communication Networks  
Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability.  ...  Furthermore, based on TABAA, we propose the first attribute-based, decentralized, fully anonymous, publicly traceable e-voting, which enables voters to engage in a number of different voting activities  ...  [30] constructed a revocable ABRS scheme with constant-size signature, but their construction only achieves anonymity and revocability.  ... 
doi:10.1155/2021/6611518 fatcat:ksm3x2yin5emldbhwaenjxrdmm

Fully Anonymous Attribute Tokens from Lattices [chapter]

Jan Camenisch, Gregory Neven, Markus Rückert
2012 Lecture Notes in Computer Science  
Our constructions involve new lattice-based tools for aggregating signatures and verifiable CCA2-secure encryption.  ...  We present two lattice-based constructions of this new primitive, one with and one without opening capabilities for the group manager.  ...  Thus, while our main focus is on anonymous attribute token schemes, we present as a corollary the first lattice-based, non-frameable group signature scheme with full anonymity.  ... 
doi:10.1007/978-3-642-32928-9_4 fatcat:khkufyiwvndenor562we2xuvwy

A code-based group signature scheme

Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit
2016 Designs, Codes and Cryptography  
Thus, many lattice-based constructions have been proposed such as [14] who first designed a lattice-based group signature scheme with both public key and signature size linear in the number of group members  ...  Our security is based on a relaxation of the model of Bellare, Shi and Zhang [3] (BSZ model) verifying the properties of anonymity, traceability and non-frameability.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their helpful comments that led to notably improve the present work.  ... 
doi:10.1007/s10623-016-0276-6 fatcat:dbp7brdbs5hslptj5suxv7765e

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption  ...  • The construction of revocable, traceable, expressible and efficient attribute encryption scheme based on elliptic curve is a very important challenge. • Because pairing-based attribute-based encryption  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

Public Key Encryption with Keyword Search in Cloud: A Survey

Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang
2020 Entropy  
From a technological viewpoint, the existing PEKS schemes can be classified into several variants: PEKS based on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based  ...  With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality.  ...  [94] proposed an attribute-based proxy re-encryption scheme with keyword search, and it fully took advantage of the attribute-based re-encryption and keyword search supporting flexible data access control  ... 
doi:10.3390/e22040421 pmid:33286195 pmcid:PMC7516898 fatcat:qovvzpdonnbd5bswb7j7q5igiq

Secure ABE Scheme for Access Management in Blockchain-based IoT

Jiansheng Zhang, Yang Xin, Yulong Gao, Xiaohui Lei, Yixian Yang
2021 IEEE Access  
Therefore, the IoT's data in our scheme is more secure and reliable. 2) VERIFIABLE Through the signature algorithm, every data on the blockchain can be verified and traceable.  ...  Afterwards, in 2018, Wang et al. designed a ABE scheme with revocation support and flexible access structure on lattice by using binary tree [34] .  ...  Targeting at these issues, in our study, by using KP-ABE scheme and blockchain technology, we design a secure access management scheme for IoT.  ... 
doi:10.1109/access.2021.3071031 fatcat:bnfegm7nvbdhda73bj3fbql4c4

Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR [article]

Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017 IACR Cryptology ePrint Archive  
Our techniques enrich the arsenal of privacy-enhancing techniques and could be useful in the constructions of other schemes such as e-cash, unique group signatures, public key encryption with verifiable  ...  Our k-TAA and BLAC schemes support concurrent enrollment while our LRS features logarithmic signature size without relying on a trusted setup.  ...  [CS03] [RST01] Jan Camenisch and Victor Shoup. Practical verifiable encryption and de-based group signature scheme with verifier-local revocation.  ... 
dblp:journals/iacr/YangALXY17 fatcat:czq22ka3j5bkvaj7pj3xycjzdm

A Survey on Contemporary MANET Security: Approaches for Securing the MANET

Rajan Patel, Pariza Kamboj
2017 International Journal of Engineering and Technology  
This article is intended to provide contemporary MANET security with perspective of routing protocol security and data security with key management, and monitoring the MANET during routing and/or data  ...  There is a requirement to secure the MANET from threats and vulnerability. Many security mechanisms are established to secure and protect the MANET.  ...  It is based on advanced cryptographic group signatures, a public key signature which provides both security and privacy. ALARM provides authentication, integrity, anonymity, and un-traceability.  ... 
doi:10.21817/ijet/2017/v9i1/170901413 fatcat:kepeg6nwofcjjce6ubghravk4a

Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices

Ke Gu, WenBin Zhang, Se-Jung Lim, Pradip Kumar Sharma, Zafer Al-Makhadmeh, Amr Tolba
2020 Sensors  
Compared with the original mesh signature scheme, the proposed scheme has less computational costs on generating final mesh signature and signature verification.  ...  A mesh signature (MS) is a useful cryptographic tool, which makes a signer sign any message anonymously.  ...  We [31] proposed a traceable identity-based group signature, which employs verifier-local revocation to revoke users.  ... 
doi:10.3390/s20030758 pmid:32019128 pmcid:PMC7038448 fatcat:twplutxndjdgpcwb6xwjnedld4

2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18

2022 IEEE Transactions on Dependable and Secure Computing  
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021.  ...  The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  -Feb. 2021 117-130 Cryptocurrencies Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability.  ... 
doi:10.1109/tdsc.2021.3129143 fatcat:iajg5t5wqrg2ricxbbllpgxaga

A survey on functional encryption

Carla Mascia, Massimiliano Sala, Irene Villa
2021 Advances in Mathematics of Communications  
In particular, we mention several schemes for each class, providing their security assumptions and comparing their properties.  ...  In this paper, we review all FE classes, describing their functionalities and main characteristics.  ...  We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments.  ... 
doi:10.3934/amc.2021049 fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4
« Previous Showing results 1 — 15 out of 45 results