A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Universal Signature Aggregators
[chapter]
2015
Lecture Notes in Computer Science
We introduce the concept of universal signature aggregators. ...
In a universal signature aggregator system, a third party, using a set of common reference parameters, can aggregate a collection of signatures produced from any set of signing algorithms (subject to a ...
the concept of universal signature aggregators. ...
doi:10.1007/978-3-662-46803-6_1
fatcat:nikkzx6tsrh2jfy7d7szhb5rse
Universal forgery of the identity-based sequential aggregate signature scheme
2009
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09
In the paper, unfortunately, we show that the scheme is universally forgeable, i.e., anyone can generate forged signatures on any messages of its choice. ...
At CCS'07, a novel identity-based sequential aggregate signature scheme was proposed and the security of the scheme was proven under the hardness assumption of a new computational problem called modified ...
An identity-based sequential aggregate signature(IBSAS) scheme provides the functionality of a sequential aggregate signature only using a signer identity such as an IP address as a public key. ...
doi:10.1145/1533057.1533080
dblp:conf/ccs/HwangLY09
fatcat:ggt7kkrjrbeqpivxeo4zjya6di
Identity-based key-insulated aggregate signature scheme
2017
Journal of King Saud University: Computer and Information Sciences
To reduce the damage caused by the key exposure problem in aggregate signatures and preserve the benefits of identity-based (ID-based) cryptography, we hereby propose the first key-insulated aggregate ...
signature scheme in ID-based setting. ...
Identity-based key-insulated aggregate signature scheme. Journal of King Saud University -Computer and Information Sciences (2015), http://dx.doi.org/10.1016/j.jksuci.2015.09.003 ...
doi:10.1016/j.jksuci.2015.09.003
fatcat:hliexgb5cbhk7neym7hc3y3fpm
Universal Designated-Verifier Signature with Aggregation
Third International Conference on Information Technology and Applications (ICITA'05)
There is a signature scheme which can aggregate two or more persons' signatures to one, called an aggregate signature. ...
In this paper, we propose a scheme of an aggregate signature which has additional functionality allowing any holder of a signature to designate the signature to any desired designated-verifier. ...
The Model of Universal Designated-Verifier Signature with Aggregation First, we introduce an aggregate signature. Consider a set U of users. Each user U i ∈ U has a signing key pair (sk i , pk i ). ...
doi:10.1109/icita.2005.293
dblp:conf/icita/MiharaT05
fatcat:3fqokampljffjitoz43jh3ysca
Multisorted Tree Algebra
2014
Applied and Computational Mathematics
The aggregation method and the fundamental properties of the aggregated algebras have been presented with an illustrative example. ...
The resulting hierarchical algebraic structures cannot be easily classified in common universal algebra varieties. ...
The first section describes the aggregation operators. Our restriction is on the aggregation of universal algebra with the same signature. ...
doi:10.11648/j.acm.20140306.12
fatcat:hokoqyiw7bfytl4rk3vxlne7d4
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
2017
IEEE Internet of Things Journal
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks. (2017). ...
Index Terms-Aggregate signature, big data, coalition attack, data aggregation, designated verifier, identity-based (ID-based), unforgeability, wireless sensor network (WSN). ...
say the aggregate signature is valid if and only if every single signature used in the aggregation is valid. ...
doi:10.1109/jiot.2016.2557487
fatcat:pbvabuxoxbe7xpmb7uguzxzixa
Aggregation Signature for Small Object Tracking
2019
IEEE Transactions on Image Processing
In this paper, we propose a novel aggregation signature suitable for small object tracking, especially aiming for the challenge of sudden and large drift. ...
First, technically, we propose a new descriptor, named aggregation signature, based on saliency, able to represent highly distinctive features for small objects. ...
AGGREGATION SIGNATURE TRACKER We exploit the aggregation signature to enhance the redetection process for small object tacking, which is called aggregation signature tracker (AST). ...
doi:10.1109/tip.2019.2940477
fatcat:kfhrkekiwjds5lqepcjs6pz5ya
Two Certificateless Aggregate Signatures From Bilinear Maps
2007
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact ...
In this work, two practical certificateless aggregate signature schemes are proposed from bilinear maps. ...
a single aggregate signature. ...
doi:10.1109/snpd.2007.132
dblp:conf/snpd/GongLHC07
fatcat:l4wfjop2n5hn7j6m4fjrwwkfsy
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin
[article]
2020
IACR Cryptology ePrint Archive
We present a sub-exponential forger by using a 𝑘-sum algorithm against the aggregate Γ-signature, which was proposed at AsiaCCS 2019 by Zhao. ...
The discussions on the real impact of the attack also highlight the significant differences between the usage of individual signatures like EC-DSA and that of aggregate signatures in the blockchain systems ...
SUB-EXPONENTIAL UNIVERSAL FORGERY UNDER A KEY-ONLY ATTACK AGAINST AGGREGATE Γ-SIGNATURE IN THE KOSK MODEL Here we present a sub-exponential universal forger under a keyonly attack against the aggregate ...
dblp:journals/iacr/HanaokaOSSTZ20
fatcat:csvivl5e3nejhoq3uwer3qa2mm
Cross Table Cubing: Mining Iceberg Cubes from Data Warehouses
[chapter]
2005
Proceedings of the 2005 SIAM International Conference on Data Mining
In terms of both computation time and space, materializing a universal base table by joining multiple tables is often very expensive or even unaffordable in real data warehouses. ...
Surprisingly, our study shows that computing iceberg cube from multiple tables directly can be even more efficient in both space and runtime than computing from a materialized universal base table. ...
Thus, for any local iceberg cell c in P D 2 whose signature contains e 1 or e 2 , such as ( * , f 1 , * , * ), can be a global iceberg cell, if the overlap of the signatures can lead to an aggregate value ...
doi:10.1137/1.9781611972757.41
dblp:conf/sdm/PeiCC05
fatcat:andsaf24ufdp7hh5rdb575uyv4
Identity based partial aggregate signature scheme without pairing
2012
2012 35th IEEE Sarnoff Symposium
But the aggregate signature in this scheme [19] is not secure since universal forgery of signature of any user is possible in this scheme. The attack in Wang et al. scheme [19] is shown in [18]. ...
But the scheme in [20] is not secure since universal forgery of the base signature scheme used in [20] is possible as shown in [18]. ...
One more aggregate signature scheme, which achieves full aggregation is by Gentry and Ramzan [11] . ...
doi:10.1109/sarnof.2012.6222731
dblp:conf/sarnoff/SelviVSR12
fatcat:pa5kmfnxsjf75mq7wq3gxqcof4
Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks
2020
IEEE Access
INDEX TERMS Aggregate signature, Certificateless signature, Type I adversary, Type II adversary,
Universal forgery attack.
I. ...
and aggregate signatures of the schemes. ...
doi:10.1109/access.2020.3023093
fatcat:agf34gt37rasvcbyz4q4sea66a
On the Security of a Certificateless Aggregate Signature Scheme
2013
International Journal of Advancements in Computing Technology
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. ...
Very recently, Xiong et al. proposed a certificateless aggregate signature scheme provably secure in the random oracle model under the Computational Diffie-Hellman assumption. ...
Aggregate: Anyone can act as an aggregate signature generator who can aggregate a collection of individual signatures. ...
doi:10.4156/ijact.vol5.issue3.42
fatcat:7mfk5eqx5rh35hsf3et4di44um
An Efficient Privacy-Preserving Scheme with Signature Aggregation and Key Updating in Smart Grid
2014
Sensor Letters
In addition, updating keys can ensure users' data to be forward secrecy, and signature aggregation can reduce computation cost. ...
Then, aggregate all m signatures into a single signature: 1 2 m ← m j=1 j ∈ G
Signature Verification Verifier can obtain m users' public keys y 1 y 2 y m , one signature aggregation
OUR SCHEME In ...
Section 3 reviews the homomorphic encryption, bilinear pairing, BLS short signature scheme, and signature aggregation and verification. ...
doi:10.1166/sl.2014.3285
fatcat:bamoxw35orhpzbopm6f26llrva
Multi-tenant Data Authentication Model for SaaS
2014
Open Cybernetics and Systemics Journal
MTDA is a composite structure that constructs pivot authentication tree (PAT) on the pivot table and combines it with signature set (S-set) built on universal table to ensure that malicious insiders can't ...
modify the data in pivot table and universal table. ...
The server combines these individual signatures into a single aggregated signature and returns the result set comprised of the tuples along with the aggregated signature. ...
doi:10.2174/1874110x01408010322
fatcat:auuww75zovglhohvucsizwjxce
« Previous
Showing results 1 — 15 out of 107,269 results