Filters








107,269 Hits in 2.6 sec

Universal Signature Aggregators [chapter]

Susan Hohenberger, Venkata Koppula, Brent Waters
2015 Lecture Notes in Computer Science  
We introduce the concept of universal signature aggregators.  ...  In a universal signature aggregator system, a third party, using a set of common reference parameters, can aggregate a collection of signatures produced from any set of signing algorithms (subject to a  ...  the concept of universal signature aggregators.  ... 
doi:10.1007/978-3-662-46803-6_1 fatcat:nikkzx6tsrh2jfy7d7szhb5rse

Universal forgery of the identity-based sequential aggregate signature scheme

Jung Yeon Hwang, Dong Hoon Lee, Moti Yung
2009 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09  
In the paper, unfortunately, we show that the scheme is universally forgeable, i.e., anyone can generate forged signatures on any messages of its choice.  ...  At CCS'07, a novel identity-based sequential aggregate signature scheme was proposed and the security of the scheme was proven under the hardness assumption of a new computational problem called modified  ...  An identity-based sequential aggregate signature(IBSAS) scheme provides the functionality of a sequential aggregate signature only using a signer identity such as an IP address as a public key.  ... 
doi:10.1145/1533057.1533080 dblp:conf/ccs/HwangLY09 fatcat:ggt7kkrjrbeqpivxeo4zjya6di

Identity-based key-insulated aggregate signature scheme

P. Vasudeva Reddy, P.V.S.S.N. Gopal
2017 Journal of King Saud University: Computer and Information Sciences  
To reduce the damage caused by the key exposure problem in aggregate signatures and preserve the benefits of identity-based (ID-based) cryptography, we hereby propose the first key-insulated aggregate  ...  signature scheme in ID-based setting.  ...  Identity-based key-insulated aggregate signature scheme. Journal of King Saud University -Computer and Information Sciences (2015), http://dx.doi.org/10.1016/j.jksuci.2015.09.003  ... 
doi:10.1016/j.jksuci.2015.09.003 fatcat:hliexgb5cbhk7neym7hc3y3fpm

Universal Designated-Verifier Signature with Aggregation

A. Mihara, K. Tanaka
Third International Conference on Information Technology and Applications (ICITA'05)  
There is a signature scheme which can aggregate two or more persons' signatures to one, called an aggregate signature.  ...  In this paper, we propose a scheme of an aggregate signature which has additional functionality allowing any holder of a signature to designate the signature to any desired designated-verifier.  ...  The Model of Universal Designated-Verifier Signature with Aggregation First, we introduce an aggregate signature. Consider a set U of users. Each user U i ∈ U has a signing key pair (sk i , pk i ).  ... 
doi:10.1109/icita.2005.293 dblp:conf/icita/MiharaT05 fatcat:3fqokampljffjitoz43jh3ysca

Multisorted Tree Algebra

Erick Patrick Zobo
2014 Applied and Computational Mathematics  
The aggregation method and the fundamental properties of the aggregated algebras have been presented with an illustrative example.  ...  The resulting hierarchical algebraic structures cannot be easily classified in common universal algebra varieties.  ...  The first section describes the aggregation operators. Our restriction is on the aggregation of universal algebra with the same signature.  ... 
doi:10.11648/j.acm.20140306.12 fatcat:hokoqyiw7bfytl4rk3vxlne7d4

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

Limin Shen, Jianfeng Ma, Ximeng Liu, Fushan Wei, Meixia Miao
2017 IEEE Internet of Things Journal  
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks. (2017).  ...  Index Terms-Aggregate signature, big data, coalition attack, data aggregation, designated verifier, identity-based (ID-based), unforgeability, wireless sensor network (WSN).  ...  say the aggregate signature is valid if and only if every single signature used in the aggregation is valid.  ... 
doi:10.1109/jiot.2016.2557487 fatcat:pbvabuxoxbe7xpmb7uguzxzixa

Aggregation Signature for Small Object Tracking

Chunlei Liu, Wenrui Ding, Jinyu Yang, Vittorio Murino, Baochang Zhang, Jungong Han, Guodong Guo
2019 IEEE Transactions on Image Processing  
In this paper, we propose a novel aggregation signature suitable for small object tracking, especially aiming for the challenge of sudden and large drift.  ...  First, technically, we propose a new descriptor, named aggregation signature, based on saliency, able to represent highly distinctive features for small objects.  ...  AGGREGATION SIGNATURE TRACKER We exploit the aggregation signature to enhance the redetection process for small object tacking, which is called aggregation signature tracker (AST).  ... 
doi:10.1109/tip.2019.2940477 fatcat:kfhrkekiwjds5lqepcjs6pz5ya

Two Certificateless Aggregate Signatures From Bilinear Maps

Zheng Gong, Yu Long, Xuan Hong, Kefei Chen
2007 Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)  
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact  ...  In this work, two practical certificateless aggregate signature schemes are proposed from bilinear maps.  ...  a single aggregate signature.  ... 
doi:10.1109/snpd.2007.132 dblp:conf/snpd/GongLHC07 fatcat:l4wfjop2n5hn7j6m4fjrwwkfsy

Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin [article]

Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao
2020 IACR Cryptology ePrint Archive  
We present a sub-exponential forger by using a 𝑘-sum algorithm against the aggregate Γ-signature, which was proposed at AsiaCCS 2019 by Zhao.  ...  The discussions on the real impact of the attack also highlight the significant differences between the usage of individual signatures like EC-DSA and that of aggregate signatures in the blockchain systems  ...  SUB-EXPONENTIAL UNIVERSAL FORGERY UNDER A KEY-ONLY ATTACK AGAINST AGGREGATE Γ-SIGNATURE IN THE KOSK MODEL Here we present a sub-exponential universal forger under a keyonly attack against the aggregate  ... 
dblp:journals/iacr/HanaokaOSSTZ20 fatcat:csvivl5e3nejhoq3uwer3qa2mm

Cross Table Cubing: Mining Iceberg Cubes from Data Warehouses [chapter]

Moonjung Cho, Jian Pei, David W. Cheung
2005 Proceedings of the 2005 SIAM International Conference on Data Mining  
In terms of both computation time and space, materializing a universal base table by joining multiple tables is often very expensive or even unaffordable in real data warehouses.  ...  Surprisingly, our study shows that computing iceberg cube from multiple tables directly can be even more efficient in both space and runtime than computing from a materialized universal base table.  ...  Thus, for any local iceberg cell c in P D 2 whose signature contains e 1 or e 2 , such as ( * , f 1 , * , * ), can be a global iceberg cell, if the overlap of the signatures can lead to an aggregate value  ... 
doi:10.1137/1.9781611972757.41 dblp:conf/sdm/PeiCC05 fatcat:andsaf24ufdp7hh5rdb575uyv4

Identity based partial aggregate signature scheme without pairing

S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan
2012 2012 35th IEEE Sarnoff Symposium  
But the aggregate signature in this scheme [19] is not secure since universal forgery of signature of any user is possible in this scheme. The attack in Wang et al. scheme [19] is shown in [18].  ...  But the scheme in [20] is not secure since universal forgery of the base signature scheme used in [20] is possible as shown in [18].  ...  One more aggregate signature scheme, which achieves full aggregation is by Gentry and Ramzan [11] .  ... 
doi:10.1109/sarnof.2012.6222731 dblp:conf/sarnoff/SelviVSR12 fatcat:pa5kmfnxsjf75mq7wq3gxqcof4

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

Kyung-Ah Shim
2020 IEEE Access  
INDEX TERMS Aggregate signature, Certificateless signature, Type I adversary, Type II adversary, Universal forgery attack. I.  ...  and aggregate signatures of the schemes.  ... 
doi:10.1109/access.2020.3023093 fatcat:agf34gt37rasvcbyz4q4sea66a

On the Security of a Certificateless Aggregate Signature Scheme

Limin Shen, Yinxia Sun
2013 International Journal of Advancements in Computing Technology  
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed.  ...  Very recently, Xiong et al. proposed a certificateless aggregate signature scheme provably secure in the random oracle model under the Computational Diffie-Hellman assumption.  ...  Aggregate: Anyone can act as an aggregate signature generator who can aggregate a collection of individual signatures.  ... 
doi:10.4156/ijact.vol5.issue3.42 fatcat:7mfk5eqx5rh35hsf3et4di44um

An Efficient Privacy-Preserving Scheme with Signature Aggregation and Key Updating in Smart Grid

Mingzhong Wang, Yan Liu, Lin Xiao, Liehuang Zhu
2014 Sensor Letters  
In addition, updating keys can ensure users' data to be forward secrecy, and signature aggregation can reduce computation cost.  ...  Then, aggregate all m signatures into a single signature: 1 2 m ← m j=1 j ∈ G Signature Verification Verifier can obtain m users' public keys y 1 y 2 y m , one signature aggregation OUR SCHEME In  ...  Section 3 reviews the homomorphic encryption, bilinear pairing, BLS short signature scheme, and signature aggregation and verification.  ... 
doi:10.1166/sl.2014.3285 fatcat:bamoxw35orhpzbopm6f26llrva

Multi-tenant Data Authentication Model for SaaS

Qingzhong Li, Lin Li, Lanju Kong, Zhongmin Yan, Hui Li
2014 Open Cybernetics and Systemics Journal  
MTDA is a composite structure that constructs pivot authentication tree (PAT) on the pivot table and combines it with signature set (S-set) built on universal table to ensure that malicious insiders can't  ...  modify the data in pivot table and universal table.  ...  The server combines these individual signatures into a single aggregated signature and returns the result set comprised of the tuples along with the aggregated signature.  ... 
doi:10.2174/1874110x01408010322 fatcat:auuww75zovglhohvucsizwjxce
« Previous Showing results 1 — 15 out of 107,269 results