A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Group Signature with Verifier-Local Revocation Based on Coding Theory
2021
Security and Communication Networks
Group signature with verifier-local revocation (VLR-GS) is a special variant of revocable group signature that not only allows a user to anonymously sign messages but also only requires the verifiers to ...
To date, a number of VLR-GS schemes have been proposed under bilinear groups and lattices, while they have not yet been instantiated based on coding theory. ...
Our main contribution is to give a generic construction for the code-based group signature scheme with support of verifier-local revocation function. ...
doi:10.1155/2021/3259767
fatcat:kvgyoxi3h5gl3kqz2uaonrowwe
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
2022
Cryptography
Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings. ...
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability. ...
In group signature schemes with verifier-local revocation [29, 39, 41, 89] , a token determines the users' revocation status. ...
doi:10.3390/cryptography6010003
fatcat:dby2hr4g4zhqtemdm3tm43552u
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation
[article]
2022
IACR Cryptology ePrint Archive
In this paper, a zero-knowledge proof scheme on the lattice has been proposed. Based on it, a group signature scheme with VLR has been constructed. ...
Therefore, an efficient lattice signature scheme with a local revocation mechanism and alter the number of users has become an important topic. ...
Fully Anonymity Our VLR group signature scheme is fully-anonymous in the random oracle model. ...
dblp:journals/iacr/HuangSL22
fatcat:anmsovq65fgirmqdwbzsdbmf6u
Foundations of Fully Dynamic Group Signatures
2020
Journal of Cryptology
Group signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager. ...
For group signatures to be applicable in practice, they need to support fully dynamic groups, i.e., users may join and leave at any time. ...
verifier-local revocation and linkable group signatures out of scope. ...
doi:10.1007/s00145-020-09357-w
fatcat:cbboijkhafbifhlsbks2lkf4qu
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting
2021
Security and Communication Networks
Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability. ...
Furthermore, based on TABAA, we propose the first attribute-based, decentralized, fully anonymous, publicly traceable e-voting, which enables voters to engage in a number of different voting activities ...
[30] constructed a revocable ABRS scheme with constant-size signature, but their construction only achieves anonymity and revocability. ...
doi:10.1155/2021/6611518
fatcat:ksm3x2yin5emldbhwaenjxrdmm
Fully Anonymous Attribute Tokens from Lattices
[chapter]
2012
Lecture Notes in Computer Science
Our constructions involve new lattice-based tools for aggregating signatures and verifiable CCA2-secure encryption. ...
We present two lattice-based constructions of this new primitive, one with and one without opening capabilities for the group manager. ...
Thus, while our main focus is on anonymous attribute token schemes, we present as a corollary the first lattice-based, non-frameable group signature scheme with full anonymity. ...
doi:10.1007/978-3-642-32928-9_4
fatcat:khkufyiwvndenor562we2xuvwy
A code-based group signature scheme
2016
Designs, Codes and Cryptography
Thus, many lattice-based constructions have been proposed such as [14] who first designed a lattice-based group signature scheme with both public key and signature size linear in the number of group members ...
Our security is based on a relaxation of the model of Bellare, Shi and Zhang [3] (BSZ model) verifying the properties of anonymity, traceability and non-frameability. ...
Acknowledgments The authors would like to thank the anonymous reviewers for their helpful comments that led to notably improve the present work. ...
doi:10.1007/s10623-016-0276-6
fatcat:dbp7brdbs5hslptj5suxv7765e
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions
2019
IEEE Access
In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified ...
encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption ...
• The construction of revocable, traceable, expressible and efficient attribute encryption scheme based on elliptic curve is a very important challenge. • Because pairing-based attribute-based encryption ...
doi:10.1109/access.2019.2946185
fatcat:tbg5a25f5rd3je4mogemegrvje
Public Key Encryption with Keyword Search in Cloud: A Survey
2020
Entropy
From a technological viewpoint, the existing PEKS schemes can be classified into several variants: PEKS based on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based ...
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. ...
[94] proposed an attribute-based proxy re-encryption scheme with keyword search, and it fully took advantage of the attribute-based re-encryption and keyword search supporting flexible data access control ...
doi:10.3390/e22040421
pmid:33286195
pmcid:PMC7516898
fatcat:qovvzpdonnbd5bswb7j7q5igiq
Secure ABE Scheme for Access Management in Blockchain-based IoT
2021
IEEE Access
Therefore, the IoT's data in our scheme is more secure and reliable.
2) VERIFIABLE Through the signature algorithm, every data on the blockchain can be verified and traceable. ...
Afterwards, in 2018, Wang et al. designed a ABE scheme with revocation support and flexible access structure on lattice by using binary tree [34] . ...
Targeting at these issues, in our study, by using KP-ABE scheme and blockchain technology, we design a secure access management scheme for IoT. ...
doi:10.1109/access.2021.3071031
fatcat:bnfegm7nvbdhda73bj3fbql4c4
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR
[article]
2017
IACR Cryptology ePrint Archive
Our techniques enrich the arsenal of privacy-enhancing techniques and could be useful in the constructions of other schemes such as e-cash, unique group signatures, public key encryption with verifiable ...
Our k-TAA and BLAC schemes support concurrent enrollment while our LRS features logarithmic signature size without relying on a trusted setup. ...
[CS03] [RST01] Jan Camenisch and Victor Shoup. Practical verifiable encryption and de-based group signature scheme with verifier-local revocation. ...
dblp:journals/iacr/YangALXY17
fatcat:czq22ka3j5bkvaj7pj3xycjzdm
A Survey on Contemporary MANET Security: Approaches for Securing the MANET
2017
International Journal of Engineering and Technology
This article is intended to provide contemporary MANET security with perspective of routing protocol security and data security with key management, and monitoring the MANET during routing and/or data ...
There is a requirement to secure the MANET from threats and vulnerability. Many security mechanisms are established to secure and protect the MANET. ...
It is based on advanced cryptographic group signatures, a public key signature which provides both security and privacy. ALARM provides authentication, integrity, anonymity, and un-traceability. ...
doi:10.21817/ijet/2017/v9i1/170901413
fatcat:kepeg6nwofcjjce6ubghravk4a
Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices
2020
Sensors
Compared with the original mesh signature scheme, the proposed scheme has less computational costs on generating final mesh signature and signature verification. ...
A mesh signature (MS) is a useful cryptographic tool, which makes a signer sign any message anonymously. ...
We [31] proposed a traceable identity-based group signature, which employs verifier-local revocation to revoke users. ...
doi:10.3390/s20030758
pmid:32019128
pmcid:PMC7038448
fatcat:twplutxndjdgpcwb6xwjnedld4
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18
2022
IEEE Transactions on Dependable and Secure Computing
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021. ...
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
-Feb. 2021 117-130 Cryptocurrencies Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. ...
doi:10.1109/tdsc.2021.3129143
fatcat:iajg5t5wqrg2ricxbbllpgxaga
A survey on functional encryption
2021
Advances in Mathematics of Communications
In particular, we mention several schemes for each class, providing their security assumptions and comparing their properties. ...
In this paper, we review all FE classes, describing their functionalities and main characteristics. ...
We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments. ...
doi:10.3934/amc.2021049
fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4
« Previous
Showing results 1 — 15 out of 45 results